owasp-amass / amass

In-depth attack surface mapping and asset discovery
https://owasp.org/www-project-amass/
Other
11.95k stars 1.88k forks source link

Feature Request : Grab subdomains from HTTP Headers #452

Open ngkogkos opened 4 years ago

ngkogkos commented 4 years ago

Hello,

The -active flag enables Amass to grab SSL certs and look for subdomains in them. I was thinking that this flag could also enable Amass to grab the HTTP rersponse and analyze the HTTP headers in the response for more subdomains.

A great example in this case are the CSP headers:

Content-Security-Policy: […]script-src 'self' www.example.com our-secret-dev-env.www.example.com;

Of course organisations could return all sorts of HTTP headers, including custom ones, so I guess a regex to attempt and find and validate subdomains from HTTP responses (based on HTTP services found for -ports ) could do the job.

Please let me know what you think :).

geeknik commented 4 years ago

Here is a bash script I wrote for this very purpose. Feel free to use it, improve it, etc.

#!/usr/bin/bash
curl -v -silent https://$1 --stderr - | awk '/^content-security-policy:/' | grep -Eo "[a-zA-Z0-9./?=_-]*" |  sed -e '/\./!d' -e '/[^A-Za-z0-9._-]/d' -e 's/^\.//' | sort -u

Sample output:

root@x:~# ./csp.sh hackerone.com
cover-photos.hackerone-user-content.com
errors.hackerone.net
hackathon-photos.hackerone-user-content.com
hackerone-us-west-2-production-attachments.s3.us-west-2.amazonaws.com
profile-photos.hackerone-user-content.com
www.google-analytics.com
www.youtube-nocookie.com
guillaume-d commented 2 years ago

This should have been closed as per #681 AFAICS, shouldn't it?

guillaume-d commented 2 years ago

Hum, after looking at the MR's changes there is no mention of Content-Security-Policy there (also no luck with a repo-wide search). So does the MR enables scraping domain names from all response headers, or am I missing something here?