Projects STRLCPY Cipherops Commits 2e2ded23
🤬
  • .gitbook/assets/image (1).png
  • .gitbook/assets/image (2).png
  • .gitbook/assets/image (3).png
  • .gitbook/assets/image (4).png
  • .gitbook/assets/image (5).png
  • .gitbook/assets/image (6).png
  • .gitbook/assets/image (7).png
  • .gitbook/assets/image (8).png
  • .gitbook/assets/image (9).png
  • .gitbook/assets/image.png
  • ■ ■ ■ ■ ■ ■
    README.md
    skipped 1 lines
    2 2   
    3 3  <div align="left">
    4 4   
    5  -<figure><img src=".gitbook/assets/image (2).png" alt="Cipherops.tech" width="188"><figcaption></figcaption></figure>
     5 +<figure><img src=".gitbook/assets/image (4).png" alt="https://tinyurl.com/cipherops" width="188"><figcaption></figcaption></figure>
    6 6   
    7 7  </div>
    8 8   
    9  -### <mark style="color:green;">Who We Are</mark>: Introducing [CipherOps](https://cipherops.tech/)
     9 +### <mark style="color:green;">Who We Are</mark>: Introducing [CipherOps](https://tinyurl.com/cipherops)
    10 10   
    11 11  At CipherOps, we are a team of dedicated professionals passionate about cybersecurity and protecting your digital assets. With a strong focus on providing comprehensive and reliable security solutions, we strive to stay ahead of the ever-evolving threats in the digital landscape.
    12 12   
    skipped 30 lines
  • ■ ■ ■ ■
    overview/recon-tips/README.md
    skipped 1 lines
    2 2   
    3 3  <div data-full-width="false">
    4 4   
    5  -<figure><img src="../../.gitbook/assets/image (4).png" alt=""><figcaption><p>The Bug Hunter's Methodology v4.0 - Recon Edition Breakdown,thanks to<a href="https://t.me/jhaddix"> @jhaddix</a></p></figcaption></figure>
     5 +<figure><img src="../../.gitbook/assets/image (3).png" alt=""><figcaption><p>The Bug Hunter's Methodology v4.0 - Recon Edition Breakdown,thanks to<a href="https://t.me/jhaddix"> @jhaddix</a></p></figcaption></figure>
    6 6   
    7 7  </div>
    8 8   
    skipped 5 lines
  • ■ ■ ■ ■ ■ ■
    overview/recon-tips/resources/best-recon-technique-for-active-subdomain-enumeration.md
    skipped 18 lines
    19 19  Command: altdns -i hackerone.txt -o data_output -r -s final.txt -w words.txt
    20 20  ```
    21 21   
    22  -<figure><img src="../../../.gitbook/assets/image (1).png" alt="Active Subdomain Enumeration Using FFUF"><figcaption><p>Active Subdomain Enumeration Using FFUF</p></figcaption></figure>
     22 +<figure><img src="../../../.gitbook/assets/image (5).png" alt="Active Subdomain Enumeration Using FFUF"><figcaption><p>Active Subdomain Enumeration Using FFUF</p></figcaption></figure>
    23 23   
    24 24  <mark style="color:green;">Technique 2:</mark> Favicon Hashes Favicons, the icons representing your website, possess unique hash values that can aid in discovering domains sharing the same hash function. Use the FavFreak tool to calculate favicon hashes. Execute the following command:
    25 25   
    skipped 1 lines
    27 27  Command: cat urls.txt | python3 favfreak.py
    28 28  ```
    29 29   
    30  -<figure><img src="../../../.gitbook/assets/image (5).png" alt="Favicon hash detecting using FavFreak"><figcaption><p>Favicon hash detecting using FavFreak</p></figcaption></figure>
     30 +<figure><img src="../../../.gitbook/assets/image (2).png" alt="Favicon hash detecting using FavFreak"><figcaption><p>Favicon hash detecting using FavFreak</p></figcaption></figure>
    31 31   
    32 32  Once the hash is calculated, you can use the same on internet search engines such as **shodan** to get the mass websites.
    33 33   
    skipped 7 lines
    41 41  command: cat subdomains.txt | dnsx -a -resp-only | nrich -
    42 42  ```
    43 43   
    44  -<figure><img src="../../../.gitbook/assets/image.png" alt="Using shodan Search Engine to detect site that have same favicon hashed"><figcaption><p>use a nrich tool to check out the subdomains </p></figcaption></figure>
     44 +<figure><img src="../../../.gitbook/assets/image (1).png" alt="Using shodan Search Engine to detect site that have same favicon hashed"><figcaption><p>use a nrich tool to check out the subdomains </p></figcaption></figure>
    45 45   
    46 46  <mark style="color:green;">Technique 4:</mark> Choosing the Right Target When dealing with applications that have numerous subdomains, selecting the right subdomain to start hunting can be challenging. Utilize the interesting subs gf pattern list to identify interesting subdomains worth investigating. Execute the following command:
    47 47   
    skipped 19 lines
    67 67  Command: cat dorks.txt | uncover
    68 68  ```
    69 69   
    70  -<figure><img src="../../../.gitbook/assets/image (9).png" alt=""><figcaption><p>uncover tool link <a href="https://github.com/projectdiscovery/uncover">https://github.com/projectdiscovery/uncover</a></p></figcaption></figure>
     70 +<figure><img src="../../../.gitbook/assets/image.png" alt=""><figcaption><p>uncover tool link <a href="https://github.com/projectdiscovery/uncover">https://github.com/projectdiscovery/uncover</a></p></figcaption></figure>
    71 71   
    72 72   
    73 73   
    skipped 11 lines
    85 85  Command: naabu -host target.com
    86 86  ```
    87 87   
    88  -<figure><img src="../../../.gitbook/assets/image (7).png" alt=""><figcaption><p>Finding open ports and service running using naabu</p></figcaption></figure>
     88 +<figure><img src="../../../.gitbook/assets/image (6).png" alt=""><figcaption><p>Finding open ports and service running using naabu</p></figcaption></figure>
    89 89   
    90 90  :clap:Thank you for taking the time to explore these amazing reconnaissance techniques. :smile:We hope you found this blog informative and useful in your endeavors.
    91 91   
Please wait...
Page is in error, reload to recover