Default Page to Admin Paths Exposure
作者分享了2024年8月开始漏洞赏金猎人计划的经历,使用subfinder和ffuf工具进行子域名枚举和模糊测试,成功发现隐藏API,并总结了自己的经验和教训。 2025-9-18 07:41:34 Author: infosecwriteups.com(查看原文) 阅读量:1 收藏

Uncovering Hidden API

SIDDHANT SHUKLA

Read for Freee..ee.e

gojo eyes

🐺Hunters,

I hope my write-ups are simple and helpful for you. So you can gain some knowledge using my bug findings and apply yourself in your bug hunting journey.

Introduction

In August 2024, after first valid Bug and a Bounty I started hunting on a new program. I was new and I don’t have any idea what to do, most of the time I was looking for subdomains using subfinder and this was the first time I started hunting for subdomains using ffuf tool.

Subdomains

I started with basic subdomain enumeration using subfinder tool:

subfinder -d target.com --all --recursive | anew subs.txt

In couple of minutes, I got a lot of subdomains and they are overwhelming to me because I don’t know what to do with them ?

So, I left all subdomains and started with fuzzing.

If you ask me, What I want to achieve? I don’t know either because at that time I was just finding Subdomains.

More Subdomains

I started again for hunting subdoamins with ffuf tool:

ffuf -u…

文章来源: https://infosecwriteups.com/default-page-to-admin-paths-exposure-1d5709b3725b?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh