INTIGRITI Profile picture
Feb 7 โ€ข 8 tweets โ€ข 3 min read
Passive recon using "Certificate Transparency": A deep dive ๐Ÿงต

We all use tools like Amass, ReconFTW & subfinder for finding new subdomains. Let's demystify these tools by looking at how they work ๐Ÿช„

Today: Recon through Certificate Transparency
What is it? How does it work? ๐Ÿ‘‡
1๏ธโƒฃ SSL Certificates
These allow users to verify a website's identity. They allow HTTPS to work and thus are at the base of how the modern web works!

These certs are issued by a CA. But what if a CA issues a cert mistakenly or even maliciously? How do users not get duped by that?
2๏ธโƒฃ Certificate Transparency
This is where CT comes into play. It's an open framework for monitoring certs ๐Ÿ”Ž

This means that all certificates are publicly disclosed! ๐Ÿค—

Domain owners can now get a list of all certs issued to their domain ๐Ÿ“œ
BUT we as hackers can now ... ๐Ÿ‘จโ€๐Ÿ’ป
3๏ธโƒฃ CT for recon
We as hackers can now also get a list of all certificates issued to a domain! ๐Ÿ“œ

This means that we can get a list of all certificates issued to a specific domain! ๐Ÿ˜Ž

And there's one specific thing that certificates can show us: More subdomains! ๐Ÿ‘‡
4๏ธโƒฃ Subject Alternative Name (SAN)
SAN is a structured way to show all the domains names and IPs that are secured by a certificate ๐Ÿ“œ

Looking into a certificate reveals these domains and IPs, giving you as a hacker a really cool passive way to gather more data on your target! ๐Ÿ’ช
5๏ธโƒฃ crtsh
How do we query those certificate transparency reports? We can use a website such as crt.sh

We can enter a domain name, and it will really simply return us all the certificates alongside the matching identities! ๐Ÿ‘ป

It's as simple as that! ๐Ÿ’ช
6๏ธโƒฃ How do the tools do it?
As far as I can tell, all the major tools use the crt(.)sh database to query the CT information ๐Ÿ“œ

Here we can how Amass makes a GET request to query the information ๐Ÿ‘‡

github.com/OWASP/Amass/blโ€ฆ
And that brings us to the end of this thread ๐Ÿงต

I hope you learned something new about Certificate Transparency and how all of these amazing tools give you the incredible results you're looking for! ๐Ÿ’ช

Want more of this kind of content? Be sure to give us a follow! ๐Ÿ’œ

โ€ข โ€ข โ€ข

Missing some Tweet in this thread? You can try to force a refresh
ใ€€

Keep Current with INTIGRITI

INTIGRITI Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @intigriti

Jan 31
If you want to master hacking JWT tokens, open this thread!

JWT tokens are often used to authenticate logged-in users. They do this by signing the data so that the server can verify forged tokens. But in some cases, we can bypass this protection! ๐Ÿคฏ

A Thread ๐Ÿงต๐Ÿ‘‡
[1๏ธโƒฃ] JWT.io by @auth0

This site is amazing for playing with and debugging JWT tokens. Just paste your token in to see what it's all about. Try to sign your first token and see how it changes when you change values!

๐Ÿ‘‡ jwt.io
[2๏ธโƒฃ] JWT attacks by @PortSwigger

The PortSwigger Academy is THE place for everything web related. This article is once again a great place for you to learn! Be sure to check out the labs as well!

๐Ÿ‘‡ portswigger.net/web-security/jโ€ฆ
Read 9 tweets
Jan 9
If you want to master SQL injections, open this thread!

SQL injection attacks are vulnerabilities that can allow attackers to access ANY data in a victim's database!๐Ÿคฏ

A Thread ๐Ÿงต๐Ÿ‘‡
[1๏ธโƒฃ] SQL injection by @PortSwigger

When talking about web vulnerabilities, PortSwigger academy is the place to go! Their labs offer a great way to practice your skills as well!

๐Ÿ‘‡ portswigger.net/web-security/sโ€ฆ
[2๏ธโƒฃ] Cheatsheet by @pentest_swissky

With so many different kinds of databases out there, you're definitely going to want a good cheatsheet to quickly look up what you need. PayloadsAllTheThings is perfect for that!

๐Ÿ‘‡ github.com/swisskyrepo/Paโ€ฆ
Read 12 tweets
Dec 20, 2022
JUST RELEASED: @securinti's talk on how to read RFC's to find unique vulnerabilities. Some highlights + video link below! ๐Ÿงต๐Ÿ‘‡
1) Why RFC's are interesting?
๐Ÿ‘‰ RFC's are sometimes based on outdated ideas on how the internet could have looked like
๐Ÿ‘‰ ...but they're still implemented in modern technology
๐Ÿ‘‰ They sometimes list potential security issues and misimplementations (but nobody reads them)
2) RFC's are long. What should you look/grep for?
๐Ÿ‘‰ Most RFC's already have paragraphs on security
๐Ÿ‘‰ Some RFC's have corrections (errata). Older versions may be insecurely implemented!
๐Ÿ‘‰ Most interesting bit? Optional parameters and extensions nobody knows about
Read 10 tweets
Dec 19, 2022
Compete in our mini-CTF and win 100$ in Intigriti SWAG! ๐Ÿ‘•

We've hidden 7 flags in all of our socials โ›ณ
Can you find them all? ๐Ÿ˜Ž

The first person to DM us with all the flags wins! ๐Ÿ”ฅ
[1๏ธโƒฃ] Spot The Vulnerability ๐Ÿ“œ

Hackers love spotting vulnerabilities! Spot the vulnerability in this code snippet and get your first flag!

๐Ÿ”— go.intigriti.com/nahamcon
[2๏ธโƒฃ] Emojiโ€™s on Mastodon ๐Ÿ˜ƒ

Hmm, the Intigriti Mastodon account posted some weird emojis. What could they mean?
Read 10 tweets
Dec 14, 2022
We let ChatGPT write today's #BugBytes tweet and this is what it wrote ๐Ÿ‘‡
I'm sorry, but I am not able to write about anything related to Bug Bytes or chatGPT, as I am a large language model trained by OpenAI and do not have access to curren-

oh nvm lets bring the human back
[1] @NCCGroupplc explores prompt injection attacks on ChatGPT, where a prompt can instruct an LLM to ignore filters or previously written text research.nccgroup.com/2022/12/05/expโ€ฆ
[2] @_Freakyclown_ explains how to turn a bug into a CVE
Read 11 tweets
Dec 13, 2022
If you want to master SSRF, open this thread!

Server-Side Request Forgery vulnerabilities are attacks that allow attackers to send arbitrary requests from the server often resulting in gaining authorized access to data!๐Ÿคฏ

A Thread ๐Ÿงต๐Ÿ‘‡
[1๏ธโƒฃ] Server-side request forgery by @PortSwigger

As always, when talking about web vulnerabilities, PortSwigger academy is the place to go! Their labs offer a great way to practice your skills as well!

๐Ÿ‘‡ portswigger.net/web-security/sโ€ฆ
[2๏ธโƒฃ] SSRF in 100 seconds by @PinkDraconian

Want a quick overview of what SSRF is? Check out this video explaining SSRF in 100 seconds!

๐Ÿ‘‡
Read 12 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(