Use CT-Exposer to Discover Internal Subdomains [Tutorial]

preview_player
Показать описание
How to Find Hidden Subdomains from Certificate Trust Logs

Cyber Weapons Lab, Episode 035

Certificate Trust logs are a security feature designed to prevent attackers from creating malicious subdomains to trick users. Unfortunately, it also creates a list of all the various subdomains that have a certificate attached, sometimes revealing private information a company might not want public. On this episode of Cyber Weapons Lab, we'll show you how to reveal this information with CT-exposer.

Follow Null Byte on:
Рекомендации по теме
Комментарии
Автор

Great video, nice to see the quality has been maintained and the enthusiasm still strong :) Keep it up.

juleswinnfield
Автор

„...because they left me stranded...“ One should never annoy nullbyte 😂

kochv
Автор

Just a correction.. the mail server you tested via browser just means that it wasn't running a web service(it actually resolved to an external ip).. not that it was internal. Great coverage of the tool though!

rtt
Автор

Great video. I ran this on own site, and follow so little info on it. Im glad for that. Keep up the great videos.

louiem
Автор

4:50 "A lot of digging"

Nice pun ^^!

GBGSK
Автор

heyy! I have a quick question.
What is the music called that you use in the intro?
I'm dying to know because it's perfect pentesting music!!

RiotingSpectre
Автор

So how can your protect yourself against CT exploits?

lynxtouch
Автор

do I do something wrong if i check emails for spam files. Such as "I want you baby" or "woman for you". is that Illegal?

Cubear
Автор

Hello bro i have question for u, im new in this so i started to use parrot, my question is how to use 2 usb wifi addapters in same time on virtual box, i have all alfa adapters and i would like to use NHA with atheros driver i have them 2 thx

apitov
Автор

Can you make videos on exploits? How to craft an exploit or something of that sort? Thank you

tensor-records
Автор

Can you make a video about how does"Key Reinstallation Attack" work?

benasin
Автор

But, will it work with pycharm? And, or with a pc?

threepoint
Автор

Next video Windows 10 with persistence please

thefenterprises
Автор

Thanks, , , information gathering now more easy

rudykhoiruddin
Автор

Can it possible to hack Windows 10 without backdoor or phishing
If it's yes help am still learning n kid

fixerdeyz