7 Recon Tricks Made Me Earn $$$ Bounty
通过被动枚举、生成子域名排列组合并验证存活子域名的方法发现隐藏的开发环境(如dev-admin.target.com),并提取带漏洞参数的URL进行分析。 2025-5-11 02:41:20 Author: infosecwriteups.com(查看原文) 阅读量:14 收藏

It4chis3c

Find your first bug by performing recon in a common but in an unusual way

Free Link | Friend Link

Hi geeks, it4chis3c (Twitter) came-up with another bounty earning write-up in the Bug Bounty Hunting Series:

It4chis3c

Bug Bounty Hunting Series

Credit: Gemini | Imagen 3

Find subdomains others miss by brute-forcing permutations.
Tools: Amass, altdns, httpx

# Step 1: Passive enumeration with Amass  
amass enum -passive -d target.com -o subs.txt

# Step 2: Generate permutations (e.g., dev-api → api-dev, beta-api)
altdns -i subs.txt -o permutations.txt -w ~/bugbounty/wordlists/altdns_words.txt

# Step 3: Resolve live subdomains
httpx -l permutations.txt -silent -o live_subs.txt

Bug found: Found dev-admin.target.com — Unauthenticated dashboard

Extract URLs with vulnerable parameters from archived data.
Tools: waybackurls


文章来源: https://infosecwriteups.com/7-recon-tricks-made-me-earn-bounty-dc46b32724a6?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh