Case Studies

Real-world examples of reconFTW in action.


Case Study 1: Bug Bounty - New Program Launch

Scenario: A new bug bounty program launched with *.target.com in scope. Goal is to find vulnerabilities quickly before other hunters.

Target Profile

  • Scope: *.target.com (wildcard)

  • Size: Unknown (new program)

  • Time: 4 hours before others catch up

  • Goal: Quick wins - subdomain takeovers, exposed panels, known CVEs

Configuration

# Custom config: bounty-rush.cfg

# Fast subdomain enumeration
SUBBRUTE=false           # Skip brute-force (time-consuming)
SUBPERMUTE=false         # Skip permutations
SUBIAPERMUTE=false

# Essential web checks only
WEBPROBESIMPLE=true
WEBPROBEFULL=false       # Skip detailed probing

# Priority vulnerability checks
NUCLEICHECK=true
NUCLEI_SEVERITY="critical,high"  # Only high-impact
SUBTAKEOVER=true         # Quick wins

# Skip slow modules
FUZZ=false
XSS=false
SQLI=false
SSRF_CHECKS=false

Execution

Results

Finding
Severity
File Location

Subdomain takeover on old.target.com

High

subdomains/takeover.txt

Exposed Jenkins on ci.target.com

Critical

vulns/nuclei_output.json

S3 bucket listing

Medium

osint/cloud_enum.txt

3 exposed admin panels

High

vulns/nuclei_output.json

Time to first finding: 23 minutes (subdomain takeover)

Key Takeaways

  1. Passive first - Always run -p before full recon

  2. Skip slow modules - Brute-force can wait

  3. Focus on quick wins - Takeovers, panels, known CVEs

  4. Review as you go - Don't wait for full scan to complete


Case Study 2: Security Assessment - Enterprise Client

Scenario: Contracted for a security assessment of a Fortune 500 company. Need full coverage with minimal disruption.

Target Profile

  • Scope: corp.example.com + IP range 10.0.0.0/8 (internal)

  • Size: Large enterprise (~5,000 subdomains expected)

  • Time: 1 week engagement

  • Goal: Complete asset inventory, all vulnerabilities documented

Pre-Engagement Setup

Configuration

Execution Plan

Day 1-2: Reconnaissance

Day 3-4: Vulnerability Assessment

Day 5: Deep Dive on Findings

Results Summary

Category
Count
Files

Subdomains

4,892

subdomains/subdomains.txt

Live web servers

1,247

webs/webs.txt

Open ports

8,432

hosts/portscan_active.txt

Critical vulns

12

vulns/nuclei_output.json

High vulns

47

vulns/nuclei_output.json

Medium vulns

183

vulns/nuclei_output.json

Email addresses

234

osint/emails.txt

GitHub secrets

8

osint/github_company_secrets.json

Notable Findings:

  • Exposed Kubernetes dashboard (critical)

  • Default credentials on 3 admin panels

  • SQL injection in legacy application

  • 2 subdomain takeover possibilities

  • 8 hardcoded API keys in public GitHub repos

Deliverable Generation

Key Takeaways

  1. Scope files are essential - Prevent accidental out-of-scope testing

  2. Rate limiting - Enterprise WAFs will block aggressive scans

  3. OSINT is gold - GitHub secrets often provide initial access vectors

  4. Document everything - Use --deep on interesting assets


Case Study 3: Red Team - Distributed Scanning with Axiom

Scenario: Red team engagement against a large organization. Need to enumerate quickly across multiple regions without attribution.

Target Profile

  • Scope: bigcorp.com and all subsidiaries

  • Size: Very large (10,000+ subdomains estimated)

  • Time: 48 hours for initial recon

  • Goal: Complete external footprint, identify entry points

Infrastructure Setup

Configuration

Execution

Monitoring Progress

Results

Scan completed in: 14 hours (vs estimated 72 hours single-machine)

Target
Subdomains
Web Servers
Critical
High

bigcorp.com

8,234

2,847

8

34

subsidiary1.com

1,892

623

3

12

subsidiary2.com

945

312

1

8

acquired-company.com

2,134

892

6

23

Total

13,205

4,674

18

77

Entry Points Identified:

  1. Exposed Citrix gateway (CVE-2023-XXXX)

  2. Password spraying vector (O365 enumeration)

  3. VPN with default credentials

  4. Subdomain takeover → potential phishing vector

  5. API key leaked in JS files → internal API access

Cost Analysis

Post-Scan Cleanup

Key Takeaways

  1. Axiom is cost-effective - Massive scans for dollars, not hours

  2. Regional distribution - Avoids geo-blocking

  3. Keep fleet alive - Reuse for multiple targets

  4. Merge results carefully - Use provided merge scripts


Case Study 4: Continuous Monitoring - CI/CD Integration

Scenario: Security team wants automated weekly scans of all company assets with alerts for new findings.

Setup

Weekly cron job:

Scan script:

Configuration

Diff Script

Alert Output

Key Takeaways

  1. Passive for monitoring - Brute-force only for initial scans

  2. Diff is everything - Focus on changes, not full results

  3. Alert on severity - Critical/High only for notifications

  4. Archive results - Keep history for trend analysis


Quick Reference: Scenario → Configuration

Scenario
Mode
Key Flags
Config Changes

Bug bounty rush

-p then -r

--adaptive-rate

Disable slow modules

Enterprise assessment

-a

-i, -x, -f

Rate limiting, thorough

Red team (distributed)

-a -v

--vps

Axiom fleet config

CI/CD monitoring

-r

-o, -f

Passive only, notifications

Quick triage

-p

None

Default passive

Deep dive (single target)

-a --deep

None

Enable everything


Documentation Info Branch: dev | Version: v3.0.0+ | Last updated: February 2026

Last updated