recon

  • /robots.tx

  • /.well-known/security.txt

  • 404 page

  • directory list
    • /admin/
    • /images/
    • /css/
    • …, try to fuzz
  • TLS named alternative names
    • change “Host” to ‘SAN’
    • openssl s_client -connect hackycorp.com:443 </dev/null 2>/dev/null | openssl x509 -noout -text | grep DNS;
    • openssl x509 -noout -text -in hackycorp.com | grep DNS;
  • Virtual host
    • change header “Host” & try http/https
    • Host headere fuzz
    • ffuf -H "Host: FUZZ.hackycorp.com" -c -w "/usr/share/dirb/wordlists/small.txt" -u https://hackycorp.com -fs 107
    • btw: ffuf is very quick.
  • TXT record
    • search from mxtoolbox.com
  • DNS zone transfer
    • dig axfr z.hackycorp.com @ns1.hackycorp.com
  • DNS version
    • dig chaos txt version.bind @z.hackycorp.com
  • github
    • code
    • commit info
    • developer of org
    • raw information from commit.patch
      • https://github.com/hackycorp/repo7/commit/666d86b5e792bec019d60499afc1d35b490b9985.patch
    • branches
      • git log --diff-filter=D --summary
  • assets.xxx.com/key.txt

  • aws s3
    • public bucket file
      • aws s3 cp s3://assets.hackycorp.com/key2.txt ./ (on Cloudshell)
  • hardcoded key in js