And the biggest question that all of that raises and stays unaddressed is how a US official and regulated gambling website is developped and probably operated directly from China?
Meaning all PII (name, address , id scans, ip, ...) are available to Chinese individuals.
The argument that the dev website is just developped in China doesn't hold as you can see that the prod admin panel is also partially in Chinese.
And what to say about the admin that is really using 123456 as password in production...
And the biggest question that all of that raises and stays unaddressed is how a US official and regulated gambling website is developped and probably operated directly from China?
Meaning all PII (name, address , id scans, ip, ...) are available to Chinese individuals.
The argument that the dev website is just developped in China doesn't hold as you can see that the prod admin panel is also partially in Chinese.
And what to say about the admin that is really using 123456 as password in production...
What's this 'subs' command being run to enumerate subdomains?
Not sure what it is but certificate transparency logs are a goldmine for this.
https://crt.sh/?q=liuxinyi1.cn
Oh got this"
"CONTEXT: PL/pgSQL function web_apis(text,text[],text[]) line 4671 at FOR over EXECUTE statement ERROR: server conn crashed?"
May be pushing a bit too hard on their postgres-rest ?
That's interesting. Suppose it doesn't do you any good if you're looking for subdomains that don't have certs though.
I suspect it's a bespoke script. The first use outputs "[domain] -> [ip]", the second use outputs "[domain] [http code] [?] [size?] [title] [info]".
I was wondering the same thing. Ran to my Kali instance and tried it out lol
So is it a thing in security distros? Is there a github for it?
[dead]
This was a really great read. Thanks for sharing.