Passive Recon with Spyse (Part-II)

Mehedi Hasan Remon
5 min readMar 27, 2021

بسم الله الرحمن الرحيم
In the name of Allah, the Compassionate, the Merciful

Assalamu Alaikum
peace be upon you

Introduction

In part-1 I showed mass attack technique like subdomain takeover. in part-2 I will show some more about mass attacks and also about specific target recon. Last week I get some bounties by doing my recon with Spyse. Let me share my experience with you

Mass Attack

So last time we saw some mass subdomain takeover

what about other issues ! let me share a query that Markroze shared with me

we can search for specific things. like here we have WATTrouter service you can do more query like jira, openvpn, wordpress so and so on
But this act can be extremely evil hacking on random assets makes no sense.

Now it’s time to filter those things to find out websites with responsible disclosure policy

Download your search result in CSV format, cut the end url and bruteforce the list with some common disclosure endpoint
You may need a pro account to download your search result.

After that you can FUZZ like this to get out all hosts with disclosure program
NOTE: FFUF -mr flag not working properly for me. If you face similar let me know, btw you can do similar with bash, python . . .

Okay enough. we are done with mass attack things. do your own research to find out more interesting query and attacks.

Recon your Target

After searching your target you will see things in crawler section. there’s a panel called related. that one really helps. you will see similar data there like if any other host is using similar icon of your target website

You will be getting AWS buckets that target company use to host assets. Now you can look for access control issues for those buckets. you will also get interesting 3rd party hosting services that your target may using for their asset hosting or any other work. so those 3rd party hosts also can lead security issue for your target

If you move into DNS history & related category again you will see some options there to look into. This feature of Spyse helped me to earn some $cash last week

webapp hosted on server from Canada was secure but same webapp hosted from US server was vulnerable with multiple server side attacks.
That program was live from 2014. In 2021 they resolved 10 reports 6 of them is mine.

No one was looking there so it was easy for me to find bugs.

I attached all reward and resource screenshot as reference material.
You should not believe in a random boy from internet at all.
There should some kind of proof what I am saying.

Now some will show offence that I am doing show off, if I don’t attach screenshot then also some will show offence that I am not telling the truth.

Whatever I am leaving it to you, you can show love or hate it’s your choice I am already broken so it make no changes to me :)

Those are things I found interesting for BugBounty hunters on Spyse. You also can look into your own for other features. This recon writeup series sponsored by Spyse. They offered me their pro account to use and let them know my feedback about their service.

You can see it your own how I used Spyse for BugBounty stuff and earned some cash. Thanks Spyse for the sponsorship and your amazing service

I am ending this writeup here. If you have any question you can ask me on Twitter at this handle remonsec. If you have general questions then instead of DM you can mention me on your tweet. So other also may get benefit from your question or if I don’t know the answare I may mention someone who knows

Have a sweet day everyone
Allah Hafiz

--

--