CloudFire

This project focuses on discovering potential IP’s leaking from behind cloud-proxied services, e.g. Cloudflare. Although there are many ways to tackle this task, we are focusing right now on CrimeFlare database lookups, search engine scraping and other enumeration techniques.

Eventually, as the project grows, it will become more modular and much more sophisticated in usage.

Installation

git clone https://github.com/RhinoSecurityLabs/Security-Research.git

cd Security-Research/tools/cfire

Install required python modules: pip install -r requirements.txt

Run installer script which simply git clones Sublist3r ./install.sh

Ideas for future discovery methods:

  • WordPress pingbacks
  • SSRF vulnerabilities
  • OOB vulnerabilities (XXE, SQL injection, etc)
  • Brute forcing DNS records – important.
  • Other asset discovery methods

Usage

Source: https://github.com/RhinoSecurityLabs/Security-Research/tree/master/tools/cfire