I hope you all are good this is my 4th blog on advance bug bounty tips and tricks. Today’s our topic is Advance Directory Fuzzing And Subdomain Takeover So let’s start.
We will use a tool to find subdomain takeover vulnerability tool: HostileSubBruteforcer
This app will bruteforce for exisiting subdomains and provide the following information:
- IP address
- if the 3rd party host has been properly setup. (for example if site.example.com is poiting to a nonexisiting Heroku subdomain, it’ll alert you) -> Currently only works with AWS, Github, Heroku, shopify, tumblr and squarespace.
There may be some false positives depending on the host configurations. (Tried to take them out as much as possible) Also works recursively at the end to get the subdomains under the ones that it has already found and dumps all your data into an output.txt file just in case (fresh one gets created at the beginning of each process).
Tool link :- https://github.com/nahamsec/HostileSubBruteforcer
How to install It
- git clone https://github.com/nahamsec/HostileSubBruteforcer
- cd HostileSubBruteforcer
- ruby sub_brute.rb –fast
Directory Fuzzing Using FFUF
Ffuf depends on Go 1.13 or greater.
usage : ffuf -w /path/to/wordlist -u https://target/FUZZ
Now let’s scan all subdomain in one single command
findomain -t exmple.com [email protected] sh -csed httpx -silent -threads 10 xargs
This will automate Directory Fuzzing process..
Thanks For Reading