Forgotten Subdomain = $1000 “AWS Breach” Bounty
一位安全研究员通过发现目标域的通配符子域名*.corp.redacted.com展开渗透测试,成功找到漏洞并获取了公司AWS基础设施及数百万用户数据的访问权限。 2025-8-31 11:32:50 Author: infosecwriteups.com(查看原文) 阅读量:9 收藏

Akash Singh

Finding Needle in The Haystack!

The Hunt Begins

Every security researcher knows the feeling, staring at a target domain, wondering where the vulnerabilities hide. Sometimes the most devastating findings come not from the main application, but from the forgotten corners of an organization’s digital infrastructure. This is the story of how a wildcard subdomain led me down a rabbit hole that ended with access to an entire company’s AWS infrastructure and the personal data of millions of users.

Press enter or click to view image in full size

Subdomain Enumeration using tools like crt.sh can help in mapping out a target

Chapter 1: The Wildcard in the Wild

It started like any other recon. Subdomain enumeration on redacted.com was returning the usual suspects – www, mail, blog. But then something interesting caught my eye: *.corp.redacted.com. A wildcard subdomain. In the security world, wildcards are like unmarked doors in a long hallway, you never know what's behind them until you try the handle.

I spun up my brute-forcing tools, feeding them a carefully crafted wordlist of common corporate services:

  • jenkins.corp.redacted.com
  • gitlab.corp.redacted.com
  • jira.corp.redacted.com
  • redmine.corp.redacted.com

文章来源: https://infosecwriteups.com/finding-needle-in-the-haystack-how-a-forgotten-subdomain-led-to-complete-aws-infrastructure-328571e88496?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh