Skip to content

Instantly share code, notes, and snippets.

@EdOverflow
Last active August 18, 2020 22:42
Show Gist options
  • Star 3 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save EdOverflow/4d424d3e90652676b0df4856ff03fad9 to your computer and use it in GitHub Desktop.
Save EdOverflow/4d424d3e90652676b0df4856ff03fad9 to your computer and use it in GitHub Desktop.

How to store all the bug bounty assets like domains, ip addresses, etc. in file and automatically check for the any 0day vuln that comes into the market?

Here is a simple approach that might work for you. Perform reconnaissance as you would typically do and collect hosts and targets. Next, find an application running the target software or setup a local instance. Gather strings that would easily allow you to discern the piece of software from other applications (e.g. with GitLab this may be _gitlab_session). With that small list of keywords in hand, fingerprint all hosts by requesting the index page using a tool such as meg by @TomNomNom and then grepping for the strings. Make sure to then store your findings in a structured fashion that allows you to query applications running that software in future. I primarily use text files in folders for this purpose but I know of others who prefer to store everything in a database.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment