Attacking Organizations with big scopes

https://www.youtube.com/watch?v=vFk0XtHfuSg

Subdomain Enumeration

Reverse Whois

Virtual Hosts Identification

  • Using Burp Intruder

  • Using FFUF

ffuf -w namelist.txt -u http://10.129.184.109 -H "HOST: FUZZ.inlanefreight.htb".
  • Gobuster

gobuster vhost -u http://10.129.118.153 -w namelist.txt -p pattern --exclude-length 301 -t 10

ASN Mapping

cat iplist | cut -fi 
for i in $(cat iplist | cut -fi); do prips $i >> ips;done
cat fbsubs  

Brute force IPs & Subdomains

for i in $(cat ips);do ffuf -w subs -u https://$i -H 'Host: FUZZ' -of csv -o $1.csv ; done

Web Fuzzing

Create Custom Wordlist of the target

  • Grap All URLs using (gau,katana)

cat "$RESULTS_DIR/subs.txt" | gau | sort -u >> "$RESULTS_DIR/urls"
cat domains | httpx | katana | sort -u >> "$RESULTS_DIR/urls"
  • LinkFinder on all urls

cat urls | rush -j10 "python3 LinkFinder/linkfinder.py -o cli -i {} | sort -u >> ouput"
  • Sorting

cat urls output | tr "/" "\n" | sort -u | more 
  • DORKING The asterisks (*) are wildcards that match any character(s). In this case, the dork will match any domain or subdomain that contains the word "example".

site:*<example>* 
site:atlassian>*
site:*<atlassian.*>* 
site:*<*yahoo.*>*
site:*yahoo.*
  • Bing Dorking

    • Remember the IP list we got from ASN?

    • Use bing to find valid hosts on the server

Dork: β€œip:127.0.0.1”
inbody:example
instreamset:(title url):example

Last updated