blacklanternsecurity / bbot

A recursive internet scanner for hackers.
https://www.blacklanternsecurity.com/bbot/
GNU General Public License v3.0
4.45k stars 397 forks source link

VHOST Keeps Repeating #1586

Open Sh4d0wHunt3rX opened 1 month ago

Sh4d0wHunt3rX commented 1 month ago

I got around 20k of these vhost, same url for all.

image

{"type": "VHOST", "id": "VHOST:dc6d4b3dcefd577ff7aa66bb9e75fd16baa8aff6", "scope_description": "in-scope", "data": {"host": "www.dell.com", "vhost": "stage-jenkinscpgstwww.cdn", "url": "https://www.dell.com/"}, "host": "www.dell.com", "resolved_hosts": ["184.30.250.68", "www1.dell-cidr.akadns.net"], "dns_children": {"A": ["184.30.250.68"], "CNAME": ["www1.dell-cidr.akadns.net"]}, "web_spider_distance": 0, "scope_distance": 0, "scan": "SCAN:5ba8f0947209a7f8e2362774209cefc59b650ea9", "timestamp": 1721833597.903664, "parent": "URL:964ab8390e8f0d053e94f8d9529542e0260a210d", "tags": ["cdn-akamai", "in-scope"], "module": "vhost", "module_sequence": "vhost", "discovery_context": "vhost brute-forced virtual hosts for https://www.dell.com/ and found VHOST: stage-jenkinscpgstwww.cdn", "discovery_path": ["Scan 2024-07-24_06-52-07 seeded with DNS_NAME: dell.com", "internetdb queried Shodan's InternetDB API for \"dell.com (143.166.136.12)\" and found OPEN_TCP_PORT: dell.com:80", "httpx visited dell.com:80 and got status code 301 at http://dell.com/", "HTTP_RESPONSE was 0B with unspecified content type", "evcavate looked in \"Location\" header and found URL_UNVERIFIED: https://www.dell.com/", "httpx visited https://www.dell.com/ and got status code 302", "vhost brute-forced virtual hosts for https://www.dell.com/ and found VHOST: stage-jenkinscpgstwww.cdn"]}
liquidsec commented 1 month ago

Oh dear.

Well I suppose virtual host wildcards are a thing...

Does this happen a lot, or is this the only time you've seen it?

Sh4d0wHunt3rX commented 4 weeks ago

Hey @liquidsec sorry, I totally forgot to respond. I get like this pretty often, this is another one today:

image

Another one:

image