Skip to content

Research: Israel Passive Recon 2026 — 24 live hosts, Cloudflare-heavy government infrastructure#28

Open
leetcrypt wants to merge 1 commit into
Ringmast4r:mainfrom
leetcrypt:research/israel-passive-recon-2026
Open

Research: Israel Passive Recon 2026 — 24 live hosts, Cloudflare-heavy government infrastructure#28
leetcrypt wants to merge 1 commit into
Ringmast4r:mainfrom
leetcrypt:research/israel-passive-recon-2026

Conversation

@leetcrypt
Copy link
Copy Markdown

🇮🇱 Israel — Passive Reconnaissance (March 2026)

At a Glance

  • 35 government, military, and intelligence domains surveyed
  • 24 confirmed live endpoints (68% reachable)
  • 1 domain missing DMARC (email spoofing risk)
  • Heavy Cloudflare deployment across government ministries

Technology Stack

  • Cloudflare WAF + Bot Management (majority of .gov.il)
  • AWS CloudFront (Israel Electric Corp)
  • Microsoft ASP.NET + SharePoint (Bank of Israel, CBS)
  • Nginx/OpenResty (Knesset, Haifa Municipality)
  • Imperva (Tel Aviv Stock Exchange)
  • Sucuri/Cloudproxy (President's Office)

Notable

  • Mossad: Bootstrap + HSTS, no CDN, 200 OK
  • Shabak: 403 behind Cloudflare Bot Management
  • Bank of Israel: Power BI exposed in headers
  • IDF: Not publicly accessible (timeout)

Methodology

Passive only. httpx + dig + openssl + nuclei (info/low). Rate-limited 5 req/s. All public data.

Files

  • RESEARCH/Israel/httpx_results.txt — HTTP fingerprinting
  • RESEARCH/Israel/dns_results.txt — DNS + DMARC/SPF audit
  • RESEARCH/Israel/nuclei_results.txt — Passive findings
  • RESEARCH/Israel/README.md — Full write-up

Country #28. 🛡️ Archonic Sentinel

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant