can you even imagine what most people do? they do recon, burst out some payloads and think that's bbh? naahh man, ill show you how a simple recon got me $100

None

I used shodan for the recon. I put the target in the query and I got various results where one was updated on the same day when I was checking. https://www.shodan.io/search?query=redacted.com

None

I than went to https://sub.sub.redacted.com and found a page which had literally nothing in it.

then i thought of fuzzing the website, i used dirsearch with the common wordlist.

dirsearch -u https://sub.sub.redacted.com/

i got to see a 403 on /.env which says the file is available but not accessible and when i tried to visit https://sub.sub.redacted.com/.env i got a cloudflare error saying "Sorry, you have been blocked You are unable to access redacted.com"

One Question That Matters

If the WAF blocks me what is it protecting?

A WAF only protects what it sits in front of. If the origin server is exposed the WAF means nothing.

So I went looking for the real server.

Shodan Changed Everything

WAF Bypass in One Step

Accessing the application through the origin IP completely bypassed the WAF. No filters No blocks No warnings

Requesting the .env file returned a clean 200 OK.

The production environment file was exposed.

What Was Leaked

The file contained critical production secrets.

Database credentials Session signing keys Internal API routes

This was more than a file leak. It was a full security control bypass.

Why This Is Serious

An attacker could avoid every WAF rule. No rate limiting No injection filters No detection With valid credentials, backend systems were within reach. This is how small misconfigs turn into big breaches.

reported it and got it fixed quickly with a P2 with $100, not much but not bad i guess.

50 claps if you like it ;) thanks for reading

Watch scan data. Test quickly. Think beyond the front door.

Connect here:

folio: https://swarnimbandekar.github.io/ LinkedIn: https://www.linkedin.com/in/swarnimbandekar/