{"id":15445,"date":"2021-04-19T13:37:14","date_gmt":"2021-04-19T20:37:14","guid":{"rendered":"https:\/\/xerosecurity.com\/wordpress\/?p=15445"},"modified":"2026-03-15T11:21:23","modified_gmt":"2026-03-15T18:21:23","slug":"passive-reconnaissance-techniques-for-penetration-testing","status":"publish","type":"post","link":"https:\/\/sn1persecurity.com\/wordpress\/passive-reconnaissance-techniques-for-penetration-testing\/","title":{"rendered":"Passive Reconnaissance Techniques For Penetration Testing"},"content":{"rendered":"<p>As a top ranked <a href=\"https:\/\/bugcrowd.com\/1N3\" target=\"_blank\" rel=\"noopener\">bug bounty researcher<\/a> and <a href=\"https:\/\/github.com\/1N3\/\" target=\"_blank\" rel=\"noopener\">Sr. Penetration Tester<\/a>, I&#8217;ve discovered some critical vulnerabilities without ever directly accessing or scanning the target in question. These vulnerabilities are typically found by querying 3rd party services to discover cached and historic URL&#8217;s from a target and searching interesting URL&#8217;s. In some cases, this has lead me to discover critical &#8220;0day&#8221; vulnerabilities in commercial security products, Corporate owned websites and online services. In this blog post, I&#8217;ll discuss the methodology and step-by-step process used to find these vulnerabilities and how we can leverage tools like <a href=\"https:\/\/sn1persecurity.com\/wordpress\/product\/sn1per-professional-v9-0-elite-bundle\/\" target=\"_blank\" rel=\"noopener\">Sn1per Professional<\/a> to assist us.<\/p>\n<p><!--more--><\/p>\n<h4>Passive Reconnaissance<\/h4>\n<p>We tend to glorify complex security issues, but more often than not, it&#8217;s the simple things that can have an even greater impact to a target&#8217;s privacy and security. It&#8217;s also easy to fall in to the trap of thinking that we have to scan everything to find impactful bugs, but that&#8217;s not always the case. <strong>What if we could query a target passively and take over accounts or services without ever touching the target directly? <\/strong>With some passive reconnaissance skills, and a little luck, we should have no problems doing just that.<strong><br \/>\n<\/strong><\/p>\n<p>To start, we can perform passive reconnaissance using <a href=\"https:\/\/github.com\/1N3\/Sn1per\" target=\"_blank\" rel=\"noopener\">Sn1per<\/a> as a starting point. Since <a href=\"https:\/\/github.com\/1N3\/Sn1per\" target=\"_blank\" rel=\"noopener\">Sn1per<\/a> already integrates many 3rd party API&#8217;s to passively gather all URL&#8217;s, a simple &#8216;<strong>stealth<\/strong>&#8216; mode scan (ie. sniper -t target.tld -m stealth -w target.tld) of the target TLD (Top Level Domain) will usually suffice. Once the scan is complete, we can then view all URL&#8217;s from the <a href=\"https:\/\/sn1persecurity.com\/wordpress\/product\/sn1per-professional-v9-0-elite-bundle\/\" target=\"_blank\" rel=\"noopener\">Sn1per Professional<\/a> web UI or command line output to look for interesting URL&#8217;s.<\/p>\n<div id=\"attachment_15446\" style=\"width: 1391px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/04\/sensitive-urls1.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-15446\" class=\"size-full wp-image-15446\" src=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/04\/sensitive-urls1.png\" alt=\"Attack Surface Monitoring\" width=\"1381\" height=\"1261\" srcset=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/04\/sensitive-urls1.png 1381w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/04\/sensitive-urls1-800x730.png 800w\" sizes=\"auto, (max-width: 1381px) 100vw, 1381px\" \/><\/a><p id=\"caption-attachment-15446\" class=\"wp-caption-text\">Attack Surface Monitoring<\/p><\/div>\n<p>We can also leverage <a href=\"https:\/\/sn1persecurity.com\/wordpress\/product\/sn1per-professional-v9-0-elite-bundle\/\" target=\"_blank\" rel=\"noopener\">Sn1per Professional<\/a>&#8216;s built-in &#8220;<strong>Recon Links<\/strong>&#8221; and &#8220;<strong>Google Dorks<\/strong>&#8221; lists to assist us in finding interesting URL&#8217;s by selecting any of the built-in links available from the web UI. This can be used to search for sub-domains using online services such as Security Trails or DNS Dumpster or gather URL&#8217;s on a target using services such as URLScan.io, PublicWWW or SpyOnWeb.<\/p>\n<p><a href=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/04\/Sn1per-Professional-v9.0-recon-links1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-15458\" src=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/04\/Sn1per-Professional-v9.0-recon-links1.png\" alt=\"\" width=\"1393\" height=\"1269\" srcset=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/04\/Sn1per-Professional-v9.0-recon-links1.png 1393w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/04\/Sn1per-Professional-v9.0-recon-links1-800x729.png 800w\" sizes=\"auto, (max-width: 1393px) 100vw, 1393px\" \/><\/a><\/p>\n<p>The below screenshot shows the result after selecting URLScan as an example.<\/p>\n<div id=\"attachment_15459\" style=\"width: 1764px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/04\/sensitive-urls4.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-15459\" class=\"size-full wp-image-15459\" src=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/04\/sensitive-urls4.png\" alt=\"Attack Surface Monitoring\" width=\"1754\" height=\"1241\" srcset=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/04\/sensitive-urls4.png 1754w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/04\/sensitive-urls4-800x566.png 800w\" sizes=\"auto, (max-width: 1754px) 100vw, 1754px\" \/><\/a><p id=\"caption-attachment-15459\" class=\"wp-caption-text\">Attack Surface Monitoring<\/p><\/div>\n<h4>Finding Interesting URL&#8217;s<\/h4>\n<p>With some time and experience either pentesting or bug bounty hunting, finding &#8220;interesting&#8221; URL&#8217;s will become a natural skill. In the meantime though, looking for strings such as &#8220;<strong>token<\/strong>&#8220;, &#8220;<strong>activation<\/strong>&#8220;, &#8220;<strong>password<\/strong>&#8220;, &#8220;<strong>reset<\/strong>&#8221; or &#8220;<strong>id<\/strong>&#8220;, etc. in the URL is usually a good start. If we know the the URL scheme being used for sensitive functions such as account activation or password reset links, we can specifically search for the affected URL&#8217;s using our online recon or Google dork links to see if any have been cached online.<\/p>\n<p>In some cases, this could yield some interesting vulnerabilities, such as:<\/p>\n<ol>\n<li>Un-used account activation or password reset links<\/li>\n<li>Sensitive information disclosed in the URL (ie. usernames, passwords, tokens, etc.)<\/li>\n<li>Sensitive or cached information disclosed in the response (email addresses, first and last name, etc.)<\/li>\n<\/ol>\n<p>After we gather all URL&#8217;s, we can use a 3rd party &#8220;URL to screenshot&#8221; service such as <a href=\"http:\/\/www.urltoscreenshot.com\/\" target=\"_blank\" rel=\"noopener\">http:\/\/www.urltoscreenshot.com\/<\/a> to passively view the URLs without ever touching the target site ourselves (if we&#8217;re concerned about disclosing our IP address). Otherwise, we can click on the links manually from the web UI to view them in a web browser for easy viewing.<\/p>\n<h4>Account Takeover via Activation and Password Reset Links<\/h4>\n<p>The screenshot below shows an example of these types of vulnerabilities where the account activation token or ID is sent via the URL. If an attacker obtains this link before the user activates their account, the attacker can takeover accounts on the vulnerable service by setting a password and any other security questions presented. Some services may also reveal the customers email address or personal information such as first and last name or more just by accessing the affected URL as seen below.<\/p>\n<div id=\"attachment_15447\" style=\"width: 1171px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/04\/sensitive-urls2.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-15447\" class=\"size-full wp-image-15447\" src=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/04\/sensitive-urls2.png\" alt=\"Attack Surface Monitoring\" width=\"1161\" height=\"924\" srcset=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/04\/sensitive-urls2.png 1161w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/04\/sensitive-urls2-800x637.png 800w\" sizes=\"auto, (max-width: 1161px) 100vw, 1161px\" \/><\/a><p id=\"caption-attachment-15447\" class=\"wp-caption-text\">Attack Surface Monitoring<\/p><\/div>\n<h4>Account Takeover via Sensitive Information Leaked in the URL<\/h4>\n<p>In other scenarios, the password reset or account activation tokens, <strong>usernames and clear-text passwords may be disclosed in the URL<\/strong> (seen below) which could allow external attackers to take over the affected account(s). The possibilities are endless, but as you can see, just by collecting and analyzing interesting URL&#8217;s, we can find some pretty impactful vulnerabilities.<\/p>\n<p>Depending on the service in question, <strong>this can lead to compromised accounts which provide critical functions<\/strong> such as encrypted email or privileged access to back-end systems and data.<\/p>\n<div id=\"attachment_15450\" style=\"width: 1747px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/04\/sensitive-urls3.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-15450\" class=\"size-full wp-image-15450\" src=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/04\/sensitive-urls3.png\" alt=\"Attack Surface Monitoring\" width=\"1737\" height=\"820\" srcset=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/04\/sensitive-urls3.png 1737w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/04\/sensitive-urls3-800x378.png 800w\" sizes=\"auto, (max-width: 1737px) 100vw, 1737px\" \/><\/a><p id=\"caption-attachment-15450\" class=\"wp-caption-text\">Attack Surface Monitoring<\/p><\/div>\n<h4>Final Thoughts<\/h4>\n<p>These are just a few examples of passive attacks that can be performed without ever touching a target&#8217;s perimeter. The impact of these attacks can result in complete account takeover and compromise to leaking sensitive information publicly. Tools such as Sn1per Professional provide an easy-to-use workflow and access to many valuable services which can aid in this process.<\/p>\n<p>As a general guide for protecting from these types of attacks:<\/p>\n<ul>\n<li>Sensitive information should never be present in the URL as it can be cached and stored and potentially accessed by unauthorized individuals.<\/li>\n<li>Account activation and password reset tokens should be expired after a reasonable time frame (ie. a few days to a week) and should be expired immediately after use to reduce the likelihood of attack.<\/li>\n<li>Sensitive data such as usernames, passwords or re-usable tokens should be submitted using the HTTP POST method to avoid sensitive data being transmitted via the URL.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<div id=\"wp-share-button-15445\" class=\"wp-share-button theme28\"><span class=\"total-share \"><i class=\"total-count-text\">Total Share<\/i> <i class=\"total-count\">75<\/i> <\/span><a target=\"_blank\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/sn1persecurity.com\/wordpress\/passive-reconnaissance-techniques-for-penetration-testing\/\" class=\"share-button share-button-15445 facebook\" id=\"facebook\" data-nonce=\"c22452ed33\">\r\n\r\n<span class=\"button-icon\"><\/span>\r\n<span class=\"button-name\">Facebook<\/span>\r\n\r\n<span class=\"button-count\">18<\/span>\r\n\r\n<\/a>\r\n\r\n<a target=\"_blank\" href=\"https:\/\/twitter.com\/intent\/tweet?url=https:\/\/sn1persecurity.com\/wordpress\/passive-reconnaissance-techniques-for-penetration-testing\/&#038;text=Passive%20Reconnaissance%20Techniques%20For%20Penetration%20Testing\" class=\"share-button share-button-15445 twitter\" id=\"twitter\" data-nonce=\"c22452ed33\">\r\n\r\n<span class=\"button-icon\"><\/span>\r\n<span class=\"button-name\">Twitter<\/span>\r\n\r\n<span class=\"button-count\">14<\/span>\r\n\r\n<\/a>\r\n\r\n<a target=\"_blank\" href=\"http:\/\/www.reddit.com\/submit?title=Passive%20Reconnaissance%20Techniques%20For%20Penetration%20Testing&#038;url=https:\/\/sn1persecurity.com\/wordpress\/passive-reconnaissance-techniques-for-penetration-testing\/\" class=\"share-button share-button-15445 reddit\" id=\"reddit\" data-nonce=\"c22452ed33\">\r\n\r\n<span class=\"button-icon\"><\/span>\r\n<span class=\"button-name\">Reddit<\/span>\r\n\r\n<span class=\"button-count\">11<\/span>\r\n\r\n<\/a>\r\n\r\n<a target=\"_blank\" href=\"https:\/\/www.linkedin.com\/shareArticle?url=https:\/\/sn1persecurity.com\/wordpress\/passive-reconnaissance-techniques-for-penetration-testing\/&#038;title=Passive%20Reconnaissance%20Techniques%20For%20Penetration%20Testing&#038;summary=&#038;source=\" class=\"share-button share-button-15445 linkedin\" id=\"linkedin\" data-nonce=\"c22452ed33\">\r\n\r\n<span class=\"button-icon\"><\/span>\r\n<span class=\"button-name\">Linkedin<\/span>\r\n\r\n<span class=\"button-count\">11<\/span>\r\n\r\n<\/a>\r\n\r\n<a title=\"More...\" href=\"#wp-share-button-15445\" class=\"share-button-more\"><span class=\"button-icon\"><i class=\"fa fa-plus\"><\/i><\/span><\/a><div class=\"wp-share-button-popup wp-share-button-popup-15445\"><div class=\"popup-buttons\"><span class=\"close\">X<\/span><a target=\"_blank\" href=\"mailto:?subject=Passive%20Reconnaissance%20Techniques%20For%20Penetration%20Testing&#038;body=https:\/\/sn1persecurity.com\/wordpress\/passive-reconnaissance-techniques-for-penetration-testing\/\" class=\"share-button share-button-15445 email\" id=\"email\">\r\n\r\n<span class=\"button-icon\"><\/span>\r\n<span class=\"button-name\">Email<\/span>\r\n<span class=\"button-count\">10<\/span>\t\t\t\t\r\n\r\n<\/a>\r\n<\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>As a top ranked bug bounty researcher and Sr. Penetration Tester, I&#8217;ve discovered some critical vulnerabilities without ever directly accessing or scanning the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":16464,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[290,80,289],"tags":[180,41,274,169,259,273,272,286,40,287,37,285,181],"class_list":["post-15445","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-attack-surface-management","category-bug-bounties","category-penetration-testing","tag-attack","tag-bugbounty","tag-guide","tag-howto","tag-management","tag-monitoring","tag-passive","tag-penetration-testing","tag-recon","tag-reconnaissance","tag-sn1per","tag-sn1persecurity","tag-surface"],"aioseo_notices":[],"jetpack_featured_media_url":"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/06\/Passive-Attack-Surface-Reconnaissance2.png","jetpack_shortlink":"https:\/\/wp.me\/pdnW96-417","jetpack_likes_enabled":true,"jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":20085,"url":"https:\/\/sn1persecurity.com\/wordpress\/5-ways-sn1per-can-automate-your-security-workflow\/","url_meta":{"origin":15445,"position":0},"title":"5 Ways Sn1per Can Automate Your Security Workflow","author":"xer0dayz","date":"September 20, 2022","format":false,"excerpt":"If you're in the security field, you know that there are a lot of moving parts to keep track of. It can be tough to stay on top of everything, and even tougher to find the time to do it all manually. That's where Sn1per comes in - it's a\u2026","rel":"","context":"In &quot;Attack Surface Management&quot;","block_context":{"text":"Attack Surface Management","link":"https:\/\/sn1persecurity.com\/wordpress\/category\/attack-surface-management\/"},"img":{"alt_text":"Automate Your Security Workflow with Sn1per","src":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Automate-Your-Security-Workflow-with-Sn1per.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Automate-Your-Security-Workflow-with-Sn1per.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Automate-Your-Security-Workflow-with-Sn1per.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Automate-Your-Security-Workflow-with-Sn1per.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":14967,"url":"https:\/\/sn1persecurity.com\/wordpress\/continuous-attack-surface-management-with-sn1per-professional\/","url_meta":{"origin":15445,"position":1},"title":"Attack Surface Management With Sn1per Professional","author":"xer0dayz","date":"February 8, 2021","format":false,"excerpt":"External Attack Surface Management (EASM) has become a crucial function for every organization to gain visibility of their perimeter security. Having the right tools and processes in place is vital to detecting new vulnerabilities before attackers do. In this blog post, we will outline the basic steps for discovering the\u2026","rel":"","context":"In &quot;Attack Surface Management&quot;","block_context":{"text":"Attack Surface Management","link":"https:\/\/sn1persecurity.com\/wordpress\/category\/attack-surface-management\/"},"img":{"alt_text":"Sn1per Professional Continuous Attack Surface Testing","src":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/Sn1per-Professional-Continuous-Attack-Surface-Testing.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/Sn1per-Professional-Continuous-Attack-Surface-Testing.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/Sn1per-Professional-Continuous-Attack-Surface-Testing.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/Sn1per-Professional-Continuous-Attack-Surface-Testing.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/Sn1per-Professional-Continuous-Attack-Surface-Testing.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/Sn1per-Professional-Continuous-Attack-Surface-Testing.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":22981,"url":"https:\/\/sn1persecurity.com\/wordpress\/attack-surface-platform\/","url_meta":{"origin":15445,"position":2},"title":"Attack Surface Management Platform &#8211; Enhancing Your Security","author":"xer0dayz","date":"January 15, 2023","format":false,"excerpt":"In today's rapidly evolving digital landscape, ensuring the security of your organization's data and infrastructure is of utmost importance. With the increasing number of cyber threats and vulnerabilities, it has become essential for businesses to proactively manage their attack surface. This is where an Attack Surface Management (ASM) platform comes\u2026","rel":"","context":"In &quot;Attack Surface Management&quot;","block_context":{"text":"Attack Surface Management","link":"https:\/\/sn1persecurity.com\/wordpress\/category\/attack-surface-management\/"},"img":{"alt_text":"External Attack Surface Management with Sn1per Enterprise","src":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Attack-Surface-Management-with-Sn1per-Enterprise.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Attack-Surface-Management-with-Sn1per-Enterprise.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Attack-Surface-Management-with-Sn1per-Enterprise.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Attack-Surface-Management-with-Sn1per-Enterprise.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Attack-Surface-Management-with-Sn1per-Enterprise.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Attack-Surface-Management-with-Sn1per-Enterprise.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":22755,"url":"https:\/\/sn1persecurity.com\/wordpress\/penetration-testing-guide\/","url_meta":{"origin":15445,"position":3},"title":"Automated Penetration Testing Guide &#8211; Your Ultimate Resource","author":"xer0dayz","date":"June 14, 2023","format":false,"excerpt":"In today's digital landscape, cybersecurity plays a crucial role in protecting sensitive information. One effective method to bolster your security measures is through automated penetration testing. In this comprehensive guide, we will explore the world of automated penetration testing, its numerous benefits, and how it can become your ultimate resource\u2026","rel":"","context":"In &quot;Attack Surface Management&quot;","block_context":{"text":"Attack Surface Management","link":"https:\/\/sn1persecurity.com\/wordpress\/category\/attack-surface-management\/"},"img":{"alt_text":"Automated Penetration Testing with Sn1per Enterprise","src":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2023\/06\/Automated-Penetration-Testing-with-Sn1per-Enterprise.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2023\/06\/Automated-Penetration-Testing-with-Sn1per-Enterprise.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2023\/06\/Automated-Penetration-Testing-with-Sn1per-Enterprise.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2023\/06\/Automated-Penetration-Testing-with-Sn1per-Enterprise.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2023\/06\/Automated-Penetration-Testing-with-Sn1per-Enterprise.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2023\/06\/Automated-Penetration-Testing-with-Sn1per-Enterprise.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":17988,"url":"https:\/\/sn1persecurity.com\/wordpress\/vmware-workspace-one-access-freemarker-ssti-cve-2022-22954-detection-with-sn1per-professional\/","url_meta":{"origin":15445,"position":4},"title":"VMware Workspace ONE Access freemarker SSTI (CVE-2022-22954) Detection with Sn1per Professional","author":"xer0dayz","date":"April 14, 2022","format":false,"excerpt":"Information regarding a critical 0-day vulnerability affecting the VMware Workspace ONE Access and Identity Manager was disclosed and designated CVE-2022-22954 which allows an un-authenticated attacker to execute arbitrary code on vulnerable servers. On April 14th, CISA & US-Cert added CVE-2022-22954 to their catalog of known exploited vulnerabilities after a number\u2026","rel":"","context":"In &quot;Attack Surface Management&quot;","block_context":{"text":"Attack Surface Management","link":"https:\/\/sn1persecurity.com\/wordpress\/category\/attack-surface-management\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/04\/Sn1per-cve-2022-22954-detection1.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/04\/Sn1per-cve-2022-22954-detection1.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/04\/Sn1per-cve-2022-22954-detection1.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/04\/Sn1per-cve-2022-22954-detection1.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/04\/Sn1per-cve-2022-22954-detection1.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/04\/Sn1per-cve-2022-22954-detection1.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":19913,"url":"https:\/\/sn1persecurity.com\/wordpress\/external-attack-surface-management-with-sn1per\/","url_meta":{"origin":15445,"position":5},"title":"External Attack Surface Management with Sn1per","author":"xer0dayz","date":"September 12, 2022","format":false,"excerpt":"In the world of cybersecurity, it's important to constantly be on the lookout for new threats. One way to do this is by keeping an eye on your organization's external attack surface. Your external attack surface is the sum total of all the ways a hacker could potentially gain access\u2026","rel":"","context":"In &quot;Attack Surface Management&quot;","block_context":{"text":"Attack Surface Management","link":"https:\/\/sn1persecurity.com\/wordpress\/category\/attack-surface-management\/"},"img":{"alt_text":"External Attack Surface Management with Sn1per Enterprise","src":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Attack-Surface-Management-with-Sn1per-Enterprise.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Attack-Surface-Management-with-Sn1per-Enterprise.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Attack-Surface-Management-with-Sn1per-Enterprise.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Attack-Surface-Management-with-Sn1per-Enterprise.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Attack-Surface-Management-with-Sn1per-Enterprise.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Attack-Surface-Management-with-Sn1per-Enterprise.png?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/posts\/15445","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/comments?post=15445"}],"version-history":[{"count":25,"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/posts\/15445\/revisions"}],"predecessor-version":[{"id":15483,"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/posts\/15445\/revisions\/15483"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/media\/16464"}],"wp:attachment":[{"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/media?parent=15445"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/categories?post=15445"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/tags?post=15445"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}