Enhancing Subdomain Enumeration for Large-Scale Recon and ASM Workflows

Subdomain enumeration holds a critical role in our reconnaissance and Attack Surface Management (ASM) workflows. In this blog, we’ll dive deep into the complexities of subdomain enumeration, exploring the diverse array of tools and techniques available. Furthermore, addressing the challenge of mitigating false negatives, i.e. missing out on subdomains, is paramount for ensuring robust security evaluations.

Supercharge Your Subdomain Enumeration: Subfinder now supports RedHunt’s Attack Surface Recon API!

Hey there, cybersecurity enthusiasts! Ever wondered how to up your game in subdomain enumeration? Well, we’ve got some exciting news. Subfinder, a tool you probably know and love, is now integrated with RedHunt’s Attack Surface Recon API. Yep, you heard that right, your favourite subdomain enumeration tool just got even better with more comprehensive results.

Introducing BucketLoot – An Automated Cloud Bucket Inspector

RedHunt Labs introduces BucketLoot – a cutting-edge, automated S3-compatible Cloud Object Storage bucket inspector designed to empower users in securing their data. BucketLoot offers an array of powerful features, allowing users to seamlessly extract valuable assets, detect secret exposures, and search for custom keywords and Regular Expressions within publicly-exposed storage buckets.

Attack Surface Management – Risks of an Exposed Docker Image

By default, every image pushed to the Docker Hub through your free account appears in the public registry by default. This business strategy of Docker Inc. to engage more people into purchasing their paid subscriptions puts the free users at risk. Once an attacker finds exposed docker images related to your organisation, there is plenty of information which can be used by the attacker to cause damage to the organisation’s security posture.