Accessing Admin Directory
文章描述了一次漏洞狩猎过程,通过使用工具如subfinder和httpx扫描子域,并利用dirsearch查找隐藏资源,最终发现了一个看似普通的404错误页面背后的潜在安全问题。 2025-7-13 05:54:41 Author: infosecwriteups.com(查看原文) 阅读量:9 收藏

SIDDHANT SHUKLA

Bug hunting through sleep, subdomains, and surprises

Mr. Prince

Read for Free..👈

Hey folks!
After spending a few hours hunting and reporting a .git exposure via CloudFront, I got back to my primary target to continue digging. If you missed that earlier write-up, you can check it out here:

How I found an exposed .git/config on a CloudFront-backed subdomain by staying persistent through dead ends.

I began with a basic recon routine — checking which subdomains were alive:

subfinder -d target.com --all --recursive | httpx

One subdomain stood out. I opened it in the browser and saw a plain message:

Cannot GET /

A boring 404 to most people — but to me, that’s a signal to dig deeper. I launched dirsearch to check for any hidden files or directories:

dirsearch -u https://sub.target.com -f -F -x 403 -t 3

文章来源: https://infosecwriteups.com/accessing-admin-directory-eec04145a0fc?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh