• Potential to find sensitive information disclosure
  • CVE Hunt
  • Hidden Path Discovery: /path1/path2/<pdfjs-viewer> , previously it was difficult to find /path1/path2 . So now we fuzz both /path1 and /path1/path2
  • Test injection vulnerabilities

1️⃣ Shodan Dork (82)

#title dependent
http.title:"PDF.js viewer"

#HTML comment dependent
http.html:"github.com/adobe-type-tools/cmap-resources" http.html:"included from viewer.html"
None
None

2️⃣ Google Dork (137)

inurl:/web/viewer.html site:target.tld
inurl:/web/viewer.html site:target.TLD.ccTLD
inurl:/web/viewer.html site:target.ccTLD
inurl:/web/viewer.html site:gov
inurl:/web/viewer.html site:gov.*
inurl:/web/viewer.html site:edu
inurl:/web/viewer.html site:edu.*

#parameterized endpoints
inurl:&
inurl:=
inurl:?
inurl:& inurl:= inurl:?
None
None

PDFJS Subdomain Hunt

site:pdfjs.*.* -site:pdfjs.express -site:pdfjs.community
site:pdfjs.*.*.* -site:pdfjs.express -site:pdfjs.community
site:pdfjs.*-*.* -site:pdfjs.express -site:pdfjs.community

//include pdfjs, pdf-js, pdf_js in your subdomain fuzzing wordlist

3️⃣ Fofa Dork (354)

title="PDF.js viewer"
None

4️⃣ ZoomEye Dork (374)

title="PDF.js viewer"
None

5️⃣ Netlas Dork (129)

http.body:("github.com/adobe-type-tools/cmap-resources" AND "included from viewer.html")
None

😈 Pro Tip of the day

How majority fuzz ? abc.xyz.123…..

How pros fuzz? abc-xyz.123_456……. (hyphens, underscores ,etc…)

Monitor the naming convention habits of the target

One hyphen can change your life :)

👇 Advanced Dorking Series