Como encontrei +100 Cross Site Scripting e SQL Injection refletidos em uma recompensa privada de bug de hackerone…

May 03 2023
.
  • Subfinder:https://github.com/projectdiscovery/subfinder
  • Localizador de recursos:https://github.com/tomnomnom/assetfinder
  • Httpx:https://github.com/projectdiscovery/httpx
  • Paramspider:https://github.com/devanshbatham/ParamSpider
  • Kxss ou GF:https://github.com/Emoe/kxss//https://github.com/tomnomnom/gf

for URL in $(</root/recon/target/httpx); do (python3 paramspider.py -d "${URL}");
done;

  1. coletando todos os domínios que estão no escopo
  2. executando o Subfinder usando o seguinte comando
  3. subfinder -dL domains.txt -o subfider-subdomains.txt
    

    cat domain_list.txt | assetfinder --subs-only > assetfinder-subdomains.txt
    

    cat subfinder-subdomains.txt assetfinder-subdomains.txt > subdomains.txt
    sort -u subdomains.txt > sort.txt
    

    cat sort.txt | httpx -mc 200 > 200_urls.txt
    

    for URL in $(</root/recon/target/200_urls.txt); do (python3 paramspider.py -d "${URL}");
    done
    

cat filtered_urls.txt | kxss