Software vulnerabilities in widely deployed, Internet-exposed applications pose a significant threat, but they are only exploited at scale when attackers have a practical way to discover vulnerable instances. One factor that makes such a discovery easier may be Certificate Transparency (CT) logs: although designed to improve trust in digital certificates, they also expose information that attackers could leverage. In this work, we investigate the misuse of CT logs for large-scale reconnaissance of self-hosted web applications. By filtering a single day of CT logs with keywords from 27 popular web applications, we identify over 96000 candidate domains. Crawling these domains reveals a median match rate of 10.9%, with some instances exceeding 20%. Our findings highlight that CT logs can provide attackers with an effective and timely method to identify potentially vulnerable instances of web applications, raising new considerations for Internet-scale security and privacy.

Poster—Reconnaissance via Certificate Transparency Logs: Exposing Self-Hosted Web Applications

Drago, Idilio
2025-01-01

Abstract

Software vulnerabilities in widely deployed, Internet-exposed applications pose a significant threat, but they are only exploited at scale when attackers have a practical way to discover vulnerable instances. One factor that makes such a discovery easier may be Certificate Transparency (CT) logs: although designed to improve trust in digital certificates, they also expose information that attackers could leverage. In this work, we investigate the misuse of CT logs for large-scale reconnaissance of self-hosted web applications. By filtering a single day of CT logs with keywords from 27 popular web applications, we identify over 96000 candidate domains. Crawling these domains reveals a median match rate of 10.9%, with some instances exceeding 20%. Our findings highlight that CT logs can provide attackers with an effective and timely method to identify potentially vulnerable instances of web applications, raising new considerations for Internet-scale security and privacy.
2025
21st International Conference on Emerging Networking EXperiments and Technologies, CoNEXT 2025
hkg
2025
CoNEXT 2025 - Proceedings of the 21st International Conference on Emerging Networking EXperiments and Technologies
34
35
certificate transparency; software vulnerabilities; target reconnaissance
Ravalico, Damiano; Trevisan, Martino; Drago, Idilio
File in questo prodotto:
File Dimensione Formato  
3765515.3771748.pdf

Accesso riservato

Descrizione: Paper
Tipo di file: PDF EDITORIALE
Dimensione 1.24 MB
Formato Adobe PDF
1.24 MB Adobe PDF   Visualizza/Apri   Richiedi una copia

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/2318/2110053
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? ND
social impact