Serverless, Not Senseless: How I Exploited Cloud Functions to Peek Into the Backend ☁️
作者通过比喻描述自己在困境中利用技术手段进行网络侦察活动,借助subfinder和httpx等工具发现目标网站的子域名和存活站点。 2025-6-25 08:13:39 Author: infosecwriteups.com(查看原文) 阅读量:6 收藏

Iski

Free Link 🎈

Hey there!😁

Image by Gemini AI

Life Hack #404: If your life feels stateless and you’re calling out into the void… you might just be a serverless function waiting to be exploited. 😌☁️

This story begins not with a loud bang, but with a soft sigh — my morning coffee went cold, my Wi-Fi blinked like a dying flashlight, and I was out of Maggi (disaster). But hey, when life blocks your recon, you switch clouds. ☁️🔎

That’s exactly what I did. And what I found… well, let’s just say the cloud had no idea I was watching from the shadows.

Just your regular mass recon day — nothing shady, just 12 tabs, a VPS, and caffeine-fueled curiosity. I ran my usual:

subfinder -d target.com | tee subs.txt
cat subs.txt | httpx -silent -status-code -title -tech-detect > alive.txt

文章来源: https://infosecwriteups.com/serverless-not-senseless-how-i-exploited-cloud-functions-to-peek-into-the-backend-%EF%B8%8F-847981fa9e2a?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh