Recon
/robots.txt/404/.well-known/security.txt/images//adminffuf -u https://hackycorp.com/FUZZ -w /path/to/your/common.txt -c -v
-u URL,FUZZ 會被替換成要掃描的 path
-w Wordlist
-c Colorize output
-v Verbose output
curl -H "Host: non-exist-host" http://hackycorp.comcurl -H "Host: non-exist-host" https://hackycorp.comopenssl s_client -connect hackycorp.com:443 -servername hackycorp.com < /dev/null | openssl x509 -noout -text | grep -A1 "Subject Alternative Name"ffuf -w /path/to/your/subdomains-top1million-5000.txt -u https://hackycorp.com -H "Host: FUZZ.hackycorp.com" -c -v -fs 107
-fs filter size (not equal to)
dig -t TXT key.z.hackycorp.comdig -t SOA z.hackycorp.comdig AXFR z.hackycorp.com @z.hackycorp.comdig -t NS z.hackycorp.comdig AXFR int @z.hackycorp.comdig chaos txt VERSION.BIND @z.hackycorp.com- AWS S3
brew install awscliaws configure- "Security credentials > Create access key"
aws s3 ls s3://assets.hackycorp.comaws s3 ls s3://assets.hackycorp.com/key2.txtaws s3 cp s3://assets.hackycorp.com/key2.txt key2.txt