BOOK THIS SPACE FOR AD
ARTICLE ADFollowing our previous discussions on reconnaissance techniques and automated security scanning, this write-up explores another crucial tool for bug bounty hunters: Wayback URLs. The Wayback Machine archives historical versions of web pages, and waybackurls helps extract these stored URLs. This can reveal forgotten or vulnerable endpoints, making it a valuable asset in the reconnaissance phase. In this continuation, we'll cover installation, usage, and best practices for incorporating Wayback URLs into your bug bounty workflow.
Before we dive into usage, let’s install the tool:
go install -v github.com/tomnomnom/waybackurls@latestVerify installation by running:
waybackurls -hTo fetch archived URLs for a target domain:
cat live.txt | waybackurlsTo extract URLs from a list of live domains:
cat live.txt | waybackurls > wayback.txtThis will save all the discovered URLs into wayback.txt, which can then be analyzed for vulnerabilities.
Archived URLs may contain exposed sensitive files, API endpoints, or credentials. You can use grep to filter them:
grep -E "@gmail|xml|json|config" wayback.txtFor JWT tokens:
grep "eyJ" wayback.txt | tee jwt_tokens.txtDecode these tokens using jwt.io to check for sensitive information.
Attackers often exploit deprecated endpoints. Use grep to search for API-related URLs:
grep -E "api|v1|v2" wayback.txtDevelopers sometimes leave backup files that can expose sensitive configurations:
grep -E ".bak|.old|.swp|.backup" wayback.txtLook for .env or .config files that might contain API keys or database credentials:
grep -i "password|apikey|secret" wayback.txtTo check which URLs are still active:
cat wayback.txt | httpx -silent -status-codeCombine Wayback URLs with nuclei to check for vulnerabilities:
cat wayback.txt | nuclei -t ~/nuclei-templates/Use gf patterns to find potential vulnerabilities:
cat wayback.txt | gf sqliBuilding on our previous topics, Wayback URLs provide another reconnaissance technique that can help uncover forgotten vulnerabilities. By integrating waybackurls with other tools like httpx, nuclei, and grep, you can automate and refine your bug bounty reconnaissance process. Stay tuned for more advanced techniques in our bug bounty series. Happy hunting! 🚀