Recon Roulette: Spinning Old Subdomains into a Fresh Critical Takeover
作者通过被动枚举、历史资产收集和爬虫工具发现了一个废弃子域名,并成功利用该资产获取重大成果。 2025-8-25 05:45:37 Author: infosecwriteups.com(查看原文) 阅读量:13 收藏

Iski

Free link 🎈

Hey there!😁

Press enter or click to view image in full size

Image by AI

Ever feel like recon is a game of roulette? You spin that wheel, drop a penny on one asset, and hope it lands on something juicy instead of a broke noodle. Well — on one reckless 3 AM recon session — I hit black. Hard. And what felt like a lucky spin turned into one of my biggest bounties yet.

It all began with my usual recon arsenal:

  • Passive enumeration with tools like Subfinder and Amass
  • Historical asset collection via waybackurls and the Wayback Machine
  • Crawling for secrets using ffuf, gf, and regex search on endpoints

I stumbled on something bizarre: an old subdomain beta.backup.old-api.target.com lingering in scope. It wasn't in use, but DNS still pointed to an AWS service that didn’t exist. Cue the hacker senses tingling.


文章来源: https://infosecwriteups.com/recon-roulette-spinning-old-subdomains-into-a-fresh-critical-takeover-47dab541e5b6?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh