Skip to content

Commit 65111b1

Browse files
carlospolopgitbook-bot
authored andcommitted
GitBook: [master] one page modified
1 parent 749fc23 commit 65111b1

File tree

1 file changed

+1
-0
lines changed

1 file changed

+1
-0
lines changed

pentesting/pentesting-web/uncovering-cloudflare.md

+1
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@
33
Techniques to try to uncover web servers behind cloudflare:
44

55
* Search for the domain inside [http://www.crimeflare.org:82/cfs.html](http://www.crimeflare.org:82/cfs.html)
6+
* Search for the domain in [https://leaked.site/index.php?resolver/cloudflare.0/](https://leaked.site/index.php?resolver/cloudflare.0/)
67
* \*\*\*\*[**CloudFlair**](https://github.com/christophetd/CloudFlair) is a tool that will search using Censys certificates that contains the domain name, then it will search for IPv4s inside those certificates and finally it will try to access the web page in those IPs.
78
* You can also use some service that gives you the **historical DNS records** of the domain. Maybe the web page is running on an IP address used before.
89
* If you find a **SSRF inside the web application** you can abuse it to obtain the IP address of the server.

0 commit comments

Comments
 (0)