Conference notes: How to Differentiate Yourself as a Bug Bounty Hunter (OWASP Stockholm)
Posted in Conference notes on November 7, 2018
Posted in Conference notes on April 25, 2018
Hi, these are the notes I took while watching the “Esoteric subdomain enumeration techniques” talk given by Bharath Kumar on LevelUp 2017.
python subdomain_enum_crtsh.py --domains <target_domain>
python subdomain_enum_censys.py <target_domain>
python subdomain_enum_censys.py ietf.org | grep ".ietf."
(to eliminate alias subdomains like cloudflare)aptitude install ldnsutils
(to install ldns-walk)ldns-walk <target_domain>
ldns-walk @ns-server <target_domain>
dig +short NSEC <target_domain> | awk '{print $1;}'
nsec3walker
Installation:
wget https://dnscurve.org/nsec3walker-20101223.tar.gz
tar -xzf nsec3walker-20101223.tar.gz
cd nsec3walker-20101223
make
Usage:
./collect icann.org > icann.org.collect # To collect hashes
./unhash < icann.org.collect > icann.org.unhash # To crack hashes
cat icann.org.unhash | grep "icann" | awk '{print $2;}' | sed 's/\.$//' # To extract subdomains found
cat icann.org.unhash | grep "icann" | wc -l # To get the number of subdomains found
nsec3map
Hashcat or JohnTheRipper (to crack the hashes)
dig AXFR @ns1.iitk.ac.in. iitk.ac.in
wget https://opendata.rapid7.com/sonar.fdns_v2/2018-03-31-1522483201-fdns_any.json.gz
zcat <dataset_name> | jq -r 'if (.name | test("\\.example\\.com$")) then .name else empty end'
python cloudflare_enum.py <cloudflare_email> <target_domain>
cat output.csv | cut -d "," -f1 | uniq
See you next time!