hacktricks/network-services-pentesting/pentesting-web/uncovering-cloudflare.md

3.1 KiB

Support HackTricks and get benefits!

Do you work in a cybersecurity company? Do you want to see your company advertised in HackTricks? or do you want to have access the latest version of the PEASS or download HackTricks in PDF? Check the SUBSCRIPTION PLANS!

Discover The PEASS Family, our collection of exclusive NFTs

Get the official PEASS & HackTricks swag

Join the 💬 Discord group or the telegram group or follow me on Twitter 🐦@carlospolopm.

Share your hacking tricks submitting PRs to the hacktricks github repo.

Techniques to try to uncover web servers behind cloudflare:

  • Search for the domain inside http://www.crimeflare.org:82/cfs.html
  • Search for the domain in https://leaked.site/index.php?resolver/cloudflare.0/
  • CloudFlair is a tool that will search using Censys certificates that contains the domain name, then it will search for IPv4s inside those certificates and finally it will try to access the web page in those IPs.
  • You can also use some service that gives you the historical DNS records of the domain. Maybe the web page is running on an IP address used before.
  • If you find a SSRF inside the web application you can abuse it to obtain the IP address of the server.
Support HackTricks and get benefits!

Do you work in a cybersecurity company? Do you want to see your company advertised in HackTricks? or do you want to have access the latest version of the PEASS or download HackTricks in PDF? Check the SUBSCRIPTION PLANS!

Discover The PEASS Family, our collection of exclusive NFTs

Get the official PEASS & HackTricks swag

Join the 💬 Discord group or the telegram group or follow me on Twitter 🐦@carlospolopm.

Share your hacking tricks submitting PRs to the hacktricks github repo.