Member-only story
In previous post, we discussed about how to setup a Recon Machine on VPS and how to use Screen to maintain your recon process even after you logout from VPS. This article would walk you through some other linux tricks Bug Bounty Hunter normally used in their hacking.
Schedule Your Task
In Linux, you can schedule your task automatically. For example, you can schedule a task to scan subdomain of a target regularly. So, you may find out its new subdomain before other hunters. Task scheduling can be done by cron job in Linux. To check if you already have a crontab created, you can use following command:
crontab -l
To create one, you can use following command:
crontab -e
Then, the crontab file would be opened for edit. For example, if you want to use sublist3r to scan subdomain, you may input like below into the file and save it:
* * * * * cd /root/sublist3r/ && /usr/bin/python sublist3r.py -d target.com >> /root/sublist3r/target.log 2>&1
/root/sublist3r/ is the folder of where your sublist3r installed. /usr/bin/python is where your python file stored. If you are not sure, you can input below command to find out:
$ which python