Identifying the Modern Attack Surface: Part 1

Whole New Methodology

… I sort of feel that this enumerating subdomains / scanning CIDRs / looking at the ASNs whatever is a pretty typical workflow at the recon stage for red team or bounty hunters. A lot of people have automated and pipelined this process because doing so is obvious.

I guess I’m not really getting the “whole new methodology” part of this.

Thanks to the Courtesy of :

https://www.reddit.com/r/netsec/comments/ev9vk5/identifying_the_modern_attack_surface_part_1/

Leave a Reply