How I Earned a Bounty Using VirusTotal Recon
My name is Vikas Anand, and I’m a cybersecurity enthusiast. In this write-up, I’ll share how I discovered a vulnerability using VirusTotal reconnaissance techniques that resulted in a successful bug bounty reward.
🧠 About the Target
The target application is a collaborative chat platform that allows users to:
- Communicate via private or group messages
- Create and manage groups
- Add or remove members
- Share files and collaborate in real-time
Each chat group can be accessed through a unique URL containing an alphanumeric token, such as:
https://example.com/inbox/78c8bc2b-25a3-4492-8c8e-61870949?ref=calendar
When this URL is visited, it grants anonymous access to the entire group — including chat history, shared files, and member messages — without requiring authentication, provided a certain setting is enabled by the group creator.
The website includes a feature labeled “Available by link”, which, when enabled, allows anyone with the group URL to access the chat room without authentication. This grants full visibility into the group’s entire chat history, shared files, and ongoing conversations, posing a significant security and privacy risk if the URL is exposed.
🔍 Reconnaissance & Discovery
Once I understood this functionality, I began hunting for exposed group URLs across the internet using multiple open-source intelligence (OSINT) techniques such as:
- Google and Bing Dorking
- Wayback Machine URLs (
waybackurls
) - URLScan.io
- VirusTotal
During my reconnaissance on VirusTotal, I struck gold.
🛠️ How to Use VirusTotal for Recon
- Create an account on VirusTotal (https://www.virustotal.com).
- Generate or locate your API key.
- Use the following endpoint to fetch URLs associated with a specific domain:
https://www.virustotal.com/vtapi/v2/domain/report?apikey=YOUR_API_KEY&domain=example.com
4. Replace YOUR_API_KEY
with your VirusTotal API key, and example.com
with your target domain.
5. In the JSON response, look under the undetected_urls
section.
These are URLs that were fetched or scanned by VirusTotal but haven't been flagged as malicious—often a goldmine for sensitive endpoints.
💥 The Vulnerability
While reviewing the undetected_urls
, I found several live group chat URLs belonging to different organizations. Anyone with these links could access group conversations, download shared files, and read sensitive discussions without authentication. This clearly qualified as an Information Disclosure vulnerability.
🧾 Reporting & Bounty
I responsibly reported the issue to the program via their vulnerability disclosure platform. The team acknowledged the bug, confirmed its severity, and rewarded me with a monetary bounty as a token of appreciation for my findings.
🎉 Conclusion
This experience highlights the power of OSINT tools like VirusTotal in bug bounty hunting. Even simple misconfigurations or unintended exposure of URLs can lead to severe security issues.
Thanks for taking the time to read this write-up. I hope it inspires you to explore unconventional recon paths in your own bug bounty journey.
Happy Hunting!
— Vikas Anand