Welcome to the repository dedicated to the analysis of the Dutch government's bug bounty program which includes an extensive list of domains, subdomains, and URLs, along with in-depth daily analysis. This is NOT official bugbounty scope.
To file a Coordinated Vulnerability Disclosure (CVD) report or to know more, please visit the page https://www.ncsc.nl/contact/kwetsbaarheid-melden.
This project aims to provide a detailed overview of the digital landscape covered by the Dutch government's bug bounty program. By cataloging and analyzing various aspects of the web infrastructure, it's aim is to contribute to the security and robustness of these digital assets.
This repository focuses on specific government-related resources. Each resource is selected based on the following criteria:
- Meta Information Requirement: The resource must include 'RIJKSOVERHEID.Organisatie' in its meta information.
- Government Logo: It's essential that the resource displays the official government logo.
- Affiliation Declaration: The page must clearly state its affiliation with the government.
Process for updating this repository is thorough and regular. Here's an overview of how it operates:
- Daily Review and Addition: New resources are added regularly, either through manual review or automatic processes.
- Use of Specialized Tools: shrewdeye.app and its standalone version are used to build pipeline for analysis and discovery.
- Workflow Pipeline:
- Subdomain discovery: - Shrewdeye.App(API), Amass, Subfinder, Assetfinder, and DnsX.
- DNS Clearout: This step is dedicated to filtering and clarifying DNS data.
- URL Collection: Httpx is used for further data processing and refinement.
- SSL Analysis: Lastly, we apply the SSLLabs API to assess SSL configurations and grades.
This structured approach ensures that our repository is always up-to-date and accurately reflects the current digital landscape of the Dutch government.
In the /data
directory, there's an analysis of security configurations for various resources, including the following information:
- URL
- SSL: Grade from https://www.ssllabs.com/ssltest/
- HTTP Rank: Based on HTTP headers statistics from below
- Server: Server header from web server. If not set +5 points
- Cookie: ✅ if HttpOnly (+7), Secure(+7) and Same-Site(+6) flag are set
- HSTS: ✅ if Strict-Transport-Security header is set(+30)
- CSP: ✅ if Content-Security-Policy header is set(+10) and unsafe-inline and unsafe-eval not present in configuration (+5)
- XFO: ✅ if X-Frame-Options header is set (+10)
- XXP: ✅ if X-Xss-Protection header is set (+10)
- RP: ✅ if Referrer-Policy header is set (+10)
- FP: ✅ if Feature-Policy header is set (+10)
- CORS: ✅ if CORS header is set without issues (+10)
- domains.txt: List of 1219 domains in scope
- subdomains.txt: Detailed list of 16151 alive subdomains.
- urls.txt: Compilation of 9930 URLs.
- all_subdomains.txt: All 32330 subdomains that were found all over the time
- /data: Folder containing daily updated analysis for every domain.
- basisbeveiliging.nl - How well the Dutch government implements basic security requirements with great security map!
- overheid.nl
- random-robbie/f985ad14fede2c04ac82dd89653f52ad
- communicatierijk.nl
- ncsc.nl
- shrewdeye.app
- ssllabs.com/ssltest
- securityheaders.com
- NCSC HOF
To file a Coordinated Vulnerability Disclosure (CVD) report or to know more, please visit the page https://www.ncsc.nl/contact/kwetsbaarheid-melden.