We mostly use amass enum and forget the rest.
But did you know you can do something more?
Did you know that you can track scan requests?
Read more ๐
#bugbountytip #bugbounty #amass #recon #infosec #cybersecurity
But did you know you can do something more?
Did you know that you can track scan requests?
Read more ๐
#bugbountytip #bugbounty #amass #recon #infosec #cybersecurity
Where do the scans you normally do on amass get stored?
Well, every single scan you do with amass get's stored in the computer you run the scan on.
Therefore, if you run the same scan again it's possible for amass to keep track of the changes that's occurred.
Well, every single scan you do with amass get's stored in the computer you run the scan on.
Therefore, if you run the same scan again it's possible for amass to keep track of the changes that's occurred.
Fresh targets are likely to be vulnerably and we can possibly find juicy information from it.
That's a wrap!
If you enjoyed this thread:
1. Follow me @thebinarybot for more of these
2. RT the tweet below to share this thread with your audience
If you enjoyed this thread:
1. Follow me @thebinarybot for more of these
2. RT the tweet below to share this thread with your audience
Loading suggestions...