Skip to content

Bug Bounty Recon Automation Script -- Scan AWS IP Range Certs for Matching FQDN

Notifications You must be signed in to change notification settings

R-s0n/Clear-Sky

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

15 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Clear Sky

This tool is designed to search for hidden subdomains or roots/seeds hosted in AWS's IP Range

Methodology based on Daehee Park's fantastic Blog Post
Used to find subdomains or roots/seeds based jhaddix's equally fantastic Recon Methodology v4.0

TL:DR

Step 1: Use masscan to identify all servers in AWS's IP range with common HTTPs ports open
Step 2: Use tls-scan to pull SSL certificate data from these servers
Step 3: Use jq to search SSL certificate data for a matching FQDN or search term
Step 3: Run a full nmap scan on all servers with a matching certificate


I AM NOT RESPONSABLE FOR HOW YOU USE THIS TOOL.  DON'T BE A DICK!                     

Install

python3 install.py

Usage

python3 clearsky.py [-h] [-u | --update] [-r | --rate] -s | --search [SEARCH_TERM]
            Example: python3 clearsky.py -u -r 40000 -s "tesla.com"

Short Long Required Notes
-u --update no Perform initial scan to download certificate data
-r --rate no Set value of masscan --rate flag (Default 40000)
-s --search yes FQDN, extension, or term to search

About

Bug Bounty Recon Automation Script -- Scan AWS IP Range Certs for Matching FQDN

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages