From d3ff9adf81b9a25f479f13d765dab90eff370902 Mon Sep 17 00:00:00 2001 From: CPol Date: Thu, 16 Feb 2023 14:44:06 +0000 Subject: [PATCH] GITBOOK-3786: No subject --- .../pentesting-web/uncovering-cloudflare.md | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/network-services-pentesting/pentesting-web/uncovering-cloudflare.md b/network-services-pentesting/pentesting-web/uncovering-cloudflare.md index 99f3e9618bc..e89b49b466f 100644 --- a/network-services-pentesting/pentesting-web/uncovering-cloudflare.md +++ b/network-services-pentesting/pentesting-web/uncovering-cloudflare.md @@ -40,6 +40,10 @@ done ### Uncovering Cloudflare from AWS machines +For a better description of this process check: + +{% embed url="https://trickest.com/blog/cloudflare-bypass-discover-ip-addresses-aws/?utm_campaign=hacktrics&utm_medium=banner&utm_source=hacktricks" %} + ```bash # Find open ports sudo masscan --max-rate 10000 -p80,443 $(curl -s https://ip-ranges.amazonaws.com/ip-ranges.json | jq -r '.prefixes[] | select(.service=="EC2") | .ip_prefix' | tr '\n' ' ') | grep "open" > all_open.txt