Subdomain Enumeration

Date: 2026-04-26 Sources: subfinder (passive), certspotter (cert transparency), amass (passive + stored DB) Active probing: none yet — Phase 2 Total unique subdomains: 75 (56 under corezoid.com, 19 under simulator.company)

corezoid.com (56)

Explicitly in-scope (per engagement letter)

Host In-scope tag Notes
corezoid.com Marketing / root
www.corezoid.com ✓ (wildcard)
api.corezoid.com Primary API
admin.corezoid.com Tenant admin (HAR provided)
account.corezoid.com Auth / SSO
jira.corezoid.com Atlassian Jira
openapi.corezoid.com OpenAPI spec host
vpn.corezoid.com VPN endpoint (fingerprint only)
superadmin.corezoid.com Not found in passive recon — check DNS direct

Discovered under *.corezoid.com (all in-scope via wildcard)

Production / customer-facing:

Admin / operator: ⚠️ High interest

Git / CI / infra: ⚠️ High interest

Environment / deployment artifacts:

Workflow / tracking:

simulator.company (19)

Explicitly in-scope

Host Notes
simulator.company Root
doc.simulator.company Documentation
mw.simulator.company Middleware (HAR provided)
sim.simulator.company Simulator UI/app

Discovered under *.simulator.company

CDN layer (likely fronted):

Environments:

Infra / other:

Phase 1 observations

Immediate attack surface candidates (for Phase 2 prioritization)

Priority Host Rationale
🔴 P0 admin-oleg.dev.corezoid.com Named-developer dev subdomain — frequently misconfigured, forgotten
🔴 P0 k8s.dev.corezoid.com Potentially exposed Kubernetes API
🔴 P0 gitlab-mambu.corezoid.com + registry Customer-branded GitLab — RCE-class surface (CVE-2021-22205 etc.)
🔴 P0 confluence-ferma.corezoid.com Confluence — CVE-2022-26134, CVE-2023-22515 class bugs
🔴 P0 jira.corezoid.com Jira — multiple high-impact CVEs
🟠 P1 admin-pre.corezoid.com, new.corezoid.com Admin UIs (non-prod may have weaker auth)
🟠 P1 zrok-dev.corezoid.com zrok tunnel — if misconfigured, bypasses perimeter
🟠 P1 corezoid-6102-{aws,azure,gcp} + corezoid69-{aws,azure,gcp} Version-labeled deployments — version disclosure + old versions possibly unpatched
🟠 P1 eks.corezoid.com, eks.simulator.company Potentially direct k8s API endpoints
🟠 P1 sip-mono-dev-123, sip-viber-dev-123 Numbered instances (123 suggests sequential) — enumerable, dev-grade
🟡 P2 mc.corezoid.com, ws.corezoid.com, connect.corezoid.com Primary product endpoints — fully audited in Phase 3/4
🟡 P2 All CDN-fronted simulator.company hosts Behind CDN — origin IP discovery attempt

Gaps to resolve in Phase 2

Tools that ran

Tool Output Status
subfinder recon/raw/subfinder-{corezoid,simulator}.txt ✅ 69 hits
certspotter API recon/raw/certspotter-{corezoid,simulator}.txt ✅ 42 hits
amass enum -passive recon/raw/amass-corezoid-clean.txt ✅ 11 (DB-confirmed resolving)
amass (simulator.company) ⚠️ interrupted at 89% before hitting simulator domain; stored DB was empty
crt.sh ❌ 502 Bad Gateway throughout Phase 1 (upstream service issue)

Next phase

Phase 2 — Active recon. Awaiting CTO go-ahead per phase-gated RoE. Will run: