Identifying the Modern Attack Surface: Part 1

Whole New Methodology

… I sort of feel that this enumerating subdomains / scanning CIDRs / looking at the ASNs whatever is a pretty typical workflow at the recon stage for red team or bounty hunters. A lot of people have automated and pipelined this process because doing so is obvious.

I guess I’m not really getting the “whole new methodology” part of this.

Thanks to the Courtesy of :

Leave a Reply