In this article, I will share information about a manual recon process through which you can find juicy endpoints πŸ’ and possibly discover the original IP 🌍, which can be useful for chaining critical vulnerabilities! πŸ”“

Three services are used in this process:

1) VirusTotal.com 🦠

This service is widely used in various tools, like Subdinder, etc. Here, we use their API key to fetch data regarding the domain.

URL: https://www.virustotal.com/vtapi/v2/domain/report?domain=<domain>&apikey=<API_KEY>

Simply replace <domain> with your target and <API_KEY> with your own API key πŸ”‘, and you're good to go! βœ…

2) AlienVault.com πŸ‘½

This service is also well-known for the recon process. Many of you may not be aware of this manual recon process, so here's how you can use it:

API endpoint: https://otx.alienvault.com/api/v1/indicators/hostname/<DOMAIN>/url_list?limit=500&page=1

Just replace <DOMAIN> with your target subdomain, and you're all set! Note: No API key is needed for this one! πŸš«πŸ”‘

3) URLScan.io πŸ”

URLScan allows you to search for domain-related information. While some features require a subscription πŸ’³, you can still access a lot of data with the free plan! πŸŽ‰

API endpoint: https://urlscan.io/api/v1/search/?q=domain:<DOMAIN>&size=10000

Again, replace <DOMAIN> with your target subdomain.

Conclusion:

With the help of these tools πŸ› οΈ, you can find JavaScript files, sensitive text files πŸ“„, PDFs with exposed information πŸ”“, and even the original IP addresses 🌐!

If you have any doubts, feel free to DM me on LinkedIn or leave a comment below! πŸ’¬