Projects STRLCPY Cipherops Commits b19a6b43
🤬
  • .gitbook/assets/20230528_193726_0000.png
  • .gitbook/assets/20230609_2310031.mp4
    Binary file.
  • .gitbook/assets/image (1).png
  • .gitbook/assets/image (10).png
  • .gitbook/assets/image (2).png
  • .gitbook/assets/image (4).png
  • .gitbook/assets/image (5).png
  • .gitbook/assets/image (6).png
  • .gitbook/assets/image (7).png
  • .gitbook/assets/image (9).png
  • .gitbook/assets/image.png
  • ■ ■ ■ ■ ■ ■
    README.md
    1 1  # 😎 Cipherops
    2 2   
     3 +<div align="left">
     4 + 
     5 +<figure><img src=".gitbook/assets/image (7).png" alt="Cipherops.tech" width="188"><figcaption></figcaption></figure>
     6 + 
     7 +</div>
     8 + 
    3 9  ### <mark style="color:green;">Who We Are</mark>: Introducing [CipherOps](https://cipherops.tech/)
    4 10   
    5 11  At CipherOps, we are a team of dedicated professionals passionate about cybersecurity and protecting your digital assets. With a strong focus on providing comprehensive and reliable security solutions, we strive to stay ahead of the ever-evolving threats in the digital landscape.
     12 + 
     13 + 
    6 14   
    7 15  #### <mark style="color:green;">Our Mission</mark>
    8 16   
    skipped 26 lines
  • ■ ■ ■ ■
    overview/recon-tips/README.md
    skipped 1 lines
    2 2   
    3 3  <div data-full-width="false">
    4 4   
    5  -<figure><img src="../../.gitbook/assets/image (7).png" alt=""><figcaption><p>The Bug Hunter's Methodology v4.0 - Recon Edition Breakdown,thanks to<a href="https://t.me/jhaddix"> @jhaddix</a></p></figcaption></figure>
     5 +<figure><img src="../../.gitbook/assets/image (2).png" alt=""><figcaption><p>The Bug Hunter's Methodology v4.0 - Recon Edition Breakdown,thanks to<a href="https://t.me/jhaddix"> @jhaddix</a></p></figcaption></figure>
    6 6   
    7 7  </div>
    8 8   
    skipped 5 lines
  • ■ ■ ■ ■ ■ ■
    overview/recon-tips/best-recon-technique-for-active-subdomain-enumeration.md
    skipped 18 lines
    19 19  Command: altdns -i hackerone.txt -o data_output -r -s final.txt -w words.txt
    20 20  ```
    21 21   
    22  -<figure><img src="../../.gitbook/assets/image (9).png" alt="Active Subdomain Enumeration Using FFUF"><figcaption><p>Active Subdomain Enumeration Using FFUF</p></figcaption></figure>
     22 +<figure><img src="../../.gitbook/assets/image (4).png" alt="Active Subdomain Enumeration Using FFUF"><figcaption><p>Active Subdomain Enumeration Using FFUF</p></figcaption></figure>
    23 23   
    24 24  <mark style="color:green;">Technique 2:</mark> Favicon Hashes Favicons, the icons representing your website, possess unique hash values that can aid in discovering domains sharing the same hash function. Use the FavFreak tool to calculate favicon hashes. Execute the following command:
    25 25   
    skipped 1 lines
    27 27  Command: cat urls.txt | python3 favfreak.py
    28 28  ```
    29 29   
    30  -<figure><img src="../../.gitbook/assets/image (5).png" alt="Favicon hash detecting using FavFreak"><figcaption><p>Favicon hash detecting using FavFreak</p></figcaption></figure>
     30 +<figure><img src="../../.gitbook/assets/image (1).png" alt="Favicon hash detecting using FavFreak"><figcaption><p>Favicon hash detecting using FavFreak</p></figcaption></figure>
    31 31   
    32 32  Once the hash is calculated, you can use the same on internet search engines such as **shodan** to get the mass websites.
    33 33   
    skipped 7 lines
    41 41  command: cat subdomains.txt | dnsx -a -resp-only | nrich -
    42 42  ```
    43 43   
    44  -<figure><img src="../../.gitbook/assets/image.png" alt="Using shodan Search Engine to detect site that have same favicon hashed"><figcaption><p>use a nrich tool to check out the subdomains </p></figcaption></figure>
     44 +<figure><img src="../../.gitbook/assets/image (6).png" alt="Using shodan Search Engine to detect site that have same favicon hashed"><figcaption><p>use a nrich tool to check out the subdomains </p></figcaption></figure>
    45 45   
    46 46  <mark style="color:green;">Technique 4:</mark> Choosing the Right Target When dealing with applications that have numerous subdomains, selecting the right subdomain to start hunting can be challenging. Utilize the interesting subs gf pattern list to identify interesting subdomains worth investigating. Execute the following command:
    47 47   
    skipped 19 lines
    67 67  Command: cat dorks.txt | uncover
    68 68  ```
    69 69   
    70  -<figure><img src="../../.gitbook/assets/image (6).png" alt=""><figcaption><p>uncover tool link <a href="https://github.com/projectdiscovery/uncover">https://github.com/projectdiscovery/uncover</a></p></figcaption></figure>
     70 +<figure><img src="../../.gitbook/assets/image (10).png" alt=""><figcaption><p>uncover tool link <a href="https://github.com/projectdiscovery/uncover">https://github.com/projectdiscovery/uncover</a></p></figcaption></figure>
    71 71   
    72 72   
    73 73   
    skipped 11 lines
    85 85  Command: naabu -host target.com
    86 86  ```
    87 87   
    88  -<figure><img src="../../.gitbook/assets/image (4).png" alt=""><figcaption><p>Finding open ports and service running using naabu</p></figcaption></figure>
     88 +<figure><img src="../../.gitbook/assets/image (9).png" alt=""><figcaption><p>Finding open ports and service running using naabu</p></figcaption></figure>
    89 89   
    90 90  :clap:Thank you for taking the time to explore these amazing reconnaissance techniques. :smile:We hope you found this blog informative and useful in your endeavors.
    91 91   
  • ■ ■ ■ ■ ■ ■
    overview/recon-tips/mastering-the-art-of-information-gathering.md
    skipped 3 lines
    4 4   
    5 5  # Mastering the Art of Information Gathering
    6 6   
    7  -### Introduction
     7 +### <mark style="color:green;">Introduction</mark>
    8 8   
    9 9  * Article source: [Recon Everything](https://infosecwriteups.com/recon-everything-48aafbb8987)
    10 10  * Key focus: Comprehensive notes on mastering the art of information gathering through reconnaissance techniques.
    11 11   
    12  -### Table of Contents:
     12 +### <mark style="color:green;">Table of Contents</mark>:
    13 13   
    14 14  1. What is Reconnaissance?
    15 15  2. Passive Reconnaissance Techniques
    skipped 29 lines
    45 45   * Documentation and Reporting
    46 46  9. Conclusion
    47 47   
    48  -### Summary and Key Takeaways:
     48 +### <mark style="color:green;">Summary and Key Takeaways:</mark>
    49 49   
    50 50  * Reconnaissance is the process of gathering information to gain insight into a target system or organization.
    51 51  * Passive techniques involve collecting publicly available data without directly interacting with the target.
    skipped 5 lines
    57 57  * Adhering to legal and ethical guidelines is crucial during reconnaissance activities.
    58 58  * A structured methodology and proper documentation enhance the effectiveness of reconnaissance efforts.
    59 59   
    60  -### Conclusion
     60 +### <mark style="color:green;">Conclusion</mark>
    61 61   
    62 62  Reconnaissance serves as the foundation for successful information gathering in the field of cybersecurity. By understanding the various techniques and tools available, security professionals can gain valuable insights into their targets. However, it is essential to remember the importance of legal and ethical considerations when conducting reconnaissance activities. With a comprehensive approach and proper documentation, the art of reconnaissance can be mastered, leading to more effective cybersecurity strategies.
    63 63   
    skipped 2 lines
  • ■ ■ ■ ■ ■ ■
    overview/recon-tips/one-liner-from-awesome-bug-bounty.md
    1 1  # One Liner from Awesome bug bounty
    2 2   
    3  -## Awesome One-liner Bug Bounty [![Awesome](https://awesome.re/badge-flat2.svg)](https://github.com/dwisiswant0/awesome-oneliner-bugbounty/tree/master) <a href="#https-github.com-dwisiswant0-awesome-oneliner-bugbounty-tree-master" id="https-github.com-dwisiswant0-awesome-oneliner-bugbounty-tree-master"></a>
     3 +## <mark style="color:green;">Awesome One-liner Bug Bounty</mark> [![Awesome](https://awesome.re/badge-flat2.svg)](https://github.com/dwisiswant0/awesome-oneliner-bugbounty/tree/master) <a href="#https-github.com-dwisiswant0-awesome-oneliner-bugbounty-tree-master" id="https-github.com-dwisiswant0-awesome-oneliner-bugbounty-tree-master"></a>
    4 4   
    5 5  > A collection of awesome one-liner scripts especially for bug bounty.
    6 6   
    7 7  This repository stores and houses various one-liner for bug bounty tips provided by me as well as contributed by the community. Your contributions and suggestions are heartily♥ welcome.
    8 8   
    9  -### Definitions
     9 +### <mark style="color:green;">Definitions</mark>
    10 10   
    11 11  This section defines specific terms or placeholders that are used throughout one-line command/scripts.
    12 12   
    skipped 444 lines
Please wait...
Page is in error, reload to recover