Passive recon using "Certificate Transparency": A deep dive ๐งต
We all use tools like Amass, ReconFTW & subfinder for finding new subdomains. Let's demystify these tools by looking at how they work ๐ช
Today: Recon through Certificate Transparency
What is it? How does it work? ๐
1๏ธโฃ SSL Certificates
These allow users to verify a website's identity. They allow HTTPS to work and thus are at the base of how the modern web works!
These certs are issued by a CA. But what if a CA issues a cert mistakenly or even maliciously? How do users not get duped by that?
2๏ธโฃ Certificate Transparency
This is where CT comes into play. It's an open framework for monitoring certs ๐
This means that all certificates are publicly disclosed! ๐ค
Domain owners can now get a list of all certs issued to their domain ๐
BUT we as hackers can now ... ๐จโ๐ป
3๏ธโฃ CT for recon
We as hackers can now also get a list of all certificates issued to a domain! ๐
This means that we can get a list of all certificates issued to a specific domain! ๐
And there's one specific thing that certificates can show us: More subdomains! ๐
4๏ธโฃ Subject Alternative Name (SAN)
SAN is a structured way to show all the domains names and IPs that are secured by a certificate ๐
Looking into a certificate reveals these domains and IPs, giving you as a hacker a really cool passive way to gather more data on your target! ๐ช
5๏ธโฃ crtsh
How do we query those certificate transparency reports? We can use a website such as crt.sh
We can enter a domain name, and it will really simply return us all the certificates alongside the matching identities! ๐ป
It's as simple as that! ๐ช
6๏ธโฃ How do the tools do it?
As far as I can tell, all the major tools use the crt(.)sh database to query the CT information ๐
Here we can how Amass makes a GET request to query the information ๐
I hope you learned something new about Certificate Transparency and how all of these amazing tools give you the incredible results you're looking for! ๐ช
Want more of this kind of content? Be sure to give us a follow! ๐
โข โข โข
Missing some Tweet in this thread? You can try to
force a refresh
If you want to master hacking JWT tokens, open this thread!
JWT tokens are often used to authenticate logged-in users. They do this by signing the data so that the server can verify forged tokens. But in some cases, we can bypass this protection! ๐คฏ
This site is amazing for playing with and debugging JWT tokens. Just paste your token in to see what it's all about. Try to sign your first token and see how it changes when you change values!
The PortSwigger Academy is THE place for everything web related. This article is once again a great place for you to learn! Be sure to check out the labs as well!
With so many different kinds of databases out there, you're definitely going to want a good cheatsheet to quickly look up what you need. PayloadsAllTheThings is perfect for that!
JUST RELEASED: @securinti's talk on how to read RFC's to find unique vulnerabilities. Some highlights + video link below! ๐งต๐
1) Why RFC's are interesting?
๐ RFC's are sometimes based on outdated ideas on how the internet could have looked like
๐ ...but they're still implemented in modern technology
๐ They sometimes list potential security issues and misimplementations (but nobody reads them)
2) RFC's are long. What should you look/grep for?
๐ Most RFC's already have paragraphs on security
๐ Some RFC's have corrections (errata). Older versions may be insecurely implemented!
๐ Most interesting bit? Optional parameters and extensions nobody knows about
We let ChatGPT write today's #BugBytes tweet and this is what it wrote ๐
I'm sorry, but I am not able to write about anything related to Bug Bytes or chatGPT, as I am a large language model trained by OpenAI and do not have access to curren-
Server-Side Request Forgery vulnerabilities are attacks that allow attackers to send arbitrary requests from the server often resulting in gaining authorized access to data!๐คฏ
A Thread ๐งต๐
[1๏ธโฃ] Server-side request forgery by @PortSwigger
As always, when talking about web vulnerabilities, PortSwigger academy is the place to go! Their labs offer a great way to practice your skills as well!