SHROUD

Cloudflare/WAF Origin Discovery & Bypass

Every wall has a crack. SHROUD finds it. Five independent discovery methods — SPF record mining, certificate transparency logs, historical DNS, Shodan integration, and subdomain enumeration — converge on the real origin IP behind any CDN or WAF. Direct verification confirms the bypass. WRAITH pivots automatically.

10
Subsystems
5
Discovery Methods
4+
CDN Providers
3
Scan Modes
WRAITH
Auto-Pivot
192
Tests
Documentation GitHub
EVERY WALL HAS A CRACK | SHROUD FINDS IT | 10 SUBSYSTEMS | SPF RECORD MINING | CERTIFICATE TRANSPARENCY | HISTORICAL DNS | SHODAN INTEGRATION | SUBDOMAIN ENUMERATION | WAF BYPASS CONFIRMED | WRAITH AUTO-PIVOT | UNLEASHED GATE | NIGHTFALL #44
EVERY WALL HAS A CRACK | SHROUD FINDS IT | 10 SUBSYSTEMS | SPF RECORD MINING | CERTIFICATE TRANSPARENCY | HISTORICAL DNS | SHODAN INTEGRATION | SUBDOMAIN ENUMERATION | WAF BYPASS CONFIRMED | WRAITH AUTO-PIVOT | UNLEASHED GATE | NIGHTFALL #44

WAFs and CDNs Are Not Origin Protection

Cloudflare, Akamai, and Fastly are reverse proxies — not shields. They sit in front of your infrastructure and filter traffic. Find the real IP behind them and every protection they offer becomes irrelevant. The WAF is bypassed. The rate limits disappear. The origin receives raw, unfiltered requests. SHROUD is built to find that IP automatically, across five independent channels, and pivot your entire offensive suite at it.

SPF Records Leak Origin IPs

Organisations configure Cloudflare for HTTP/HTTPS traffic but forget that email often bypasses the CDN entirely. SPF records published in DNS TXT entries expose the real mail server IPs — and mail infrastructure frequently shares hosting with the web origin. SHROUD recursively resolves every ip4: mechanism in the SPF chain.

Certificate Transparency Is Public History

Every SSL certificate ever issued for a domain is logged publicly in certificate transparency logs. Certificates issued before CDN deployment — or for staging environments — resolve to the real origin IP. crt.sh exposes this history openly. SHROUD mines every entry and resolves every hostname it finds.

Historical DNS Doesn't Lie

Before an organisation moved behind Cloudflare, their DNS A record pointed directly at the origin server. Historical DNS providers store those pre-CDN records. The IP hasn't changed — only the DNS entry has. SHROUD queries HackerTarget's free API for both historical and current records across all subdomains.

Subdomains Often Bypass the CDN

Mail, FTP, cPanel, staging, dev, and admin subdomains are frequently configured to resolve directly to the origin — bypassing the CDN entirely. Administrators add the primary domain to Cloudflare but forget that mail.example.com resolves straight to port 25 on the same server. SHROUD checks 52 bypass subdomains automatically.

Shodan Has Already Scanned It

Shodan continuously crawls the internet and indexes every open port it finds. If your origin server was ever exposed to the internet — before or after CDN deployment — Shodan has a record of its IP and open services. SHROUD queries Shodan's API and cross-references every result against the other discovery channels.

Verification Eliminates False Positives

Discovery without verification produces noise. SHROUD's PROBE subsystem sends real HTTP requests directly to each candidate IP with the correct Host header — confirming the target's actual content is served, checking for WAF headers, and fingerprinting the real server. Confidence scoring ranks every candidate before STRIKE fires.

Five Discovery Channels. One Confirmed Origin.

SHROUD is built from ten subsystems that cover the complete origin discovery pipeline. From SPF parsing and certificate transparency mining through subdomain enumeration, direct IP verification, server fingerprinting, confidence scoring, and automated WRAITH pivot — every phase makes real network requests. No hardcoded data. No simulations.

01

VEIL

SPF RECORD PARSING

Parses SPF TXT records from DNS and recursively resolves every include: chain up to four levels deep. Extracts ip4: mechanisms and redirects to build a complete picture of all IPs associated with the domain's email infrastructure.

  • DNS TXT record query via dnspython
  • Recursive include: chain resolution (depth 4)
  • ip4:, ip6:, a:, mx: mechanism extraction
  • redirect= and exp= modifier handling
  • Auxiliary subdomain SPF queries (mail, smtp, mx)
02

ATLAS

CERTIFICATE TRANSPARENCY

Queries the crt.sh certificate transparency API for all certificates ever issued to the target domain using the %.domain wildcard. Resolves every discovered hostname to its current IP address and checks for direct IP entries.

  • crt.sh API query — real HTTP, no API key required
  • %.domain wildcard captures all subdomains
  • Name value extraction and deduplication
  • DNS resolution of all discovered hostnames
  • Pre-CDN certificate IP extraction
03

TRACE

HISTORICAL DNS

Queries HackerTarget's free API for historical DNS records — both the hostsearch endpoint (all subdomain:IP pairs ever seen) and the DNS lookup endpoint (current A records). Filters private IPs automatically.

  • HackerTarget hostsearch — subdomain:IP pairs
  • HackerTarget DNS lookup — current A records
  • Private IP filtering (RFC1918 + documentation ranges)
  • Subdomain discovery as a side effect
  • No API key required for free tier
04

SENSOR

SHODAN INTEGRATION

Queries Shodan's API for hosts associated with the target domain. Uses DNS resolution and host search endpoints. Extracts open ports, OS fingerprints, vulnerability lists, and organisation data from every Shodan record found.

  • Shodan DNS resolve endpoint
  • Shodan host search (paid key, SHODAN_API_KEY env)
  • Open port extraction per host
  • CVE / vulnerability list from Shodan vuln data
  • Graceful degradation if no key is set
05

SWEEP

SUBDOMAIN ENUMERATION

Attempts DNS resolution for 52 bypass subdomains known to frequently avoid CDN protection. Runs all queries in parallel. Detected CDN IPs are filtered out automatically, leaving only candidates that resolve to non-CDN infrastructure.

  • 52 bypass subdomain wordlist (mail, ftp, cpanel, staging, dev, origin, direct, admin, api, vpn...)
  • Parallel DNS resolution (20 workers)
  • Cloudflare, Fastly, Akamai, CloudFront CDN detection
  • CDN IPs filtered — non-CDN IPs promoted
  • Subdomain name preserved in report
06

PROBE

IP VERIFICATION

Sends real HTTP/HTTPS requests directly to each candidate IP with the correct Host header. Checks for target content, inspects response headers for WAF indicators, and tests ports 443, 80, 8443, and 8080 in sequence. No simulation.

  • Direct HTTP with Host: domain header
  • WAF header detection (CF-Ray, X-Sucuri, X-Akamai...)
  • CDN error page content detection
  • Content keyword matching
  • 10 parallel workers — all candidates probed concurrently
07

MARK

SERVER FINGERPRINTING

Extracts detailed server fingerprints from HTTP response headers. Identifies web server software and version, application framework, programming language, OS hints, and hosting panel indicators. Notes security header posture.

  • Nginx, Apache, IIS, LiteSpeed, Caddy, OpenResty detection
  • PHP, ASP.NET, Ruby, Python, Node.js framework detection
  • cPanel, Plesk, DirectAdmin hosting panel detection
  • HSTS, CSP, CORS, X-Frame-Options analysis
  • Server version extraction from headers
08

SCORE

CONFIDENCE SCORING

Aggregates evidence from all five discovery channels and both verification subsystems into a unified confidence score for each candidate IP. Deduplicates across sources, applies corroboration bonuses, and ranks all candidates before STRIKE fires.

  • Weighted scoring: SPF 0.20, CT 0.15, DNS 0.15, Shodan 0.10, Subdomain 0.20
  • Probe connection +0.30, WAF absent +0.30, content match +0.25
  • Corroboration bonus for multi-method confirmation
  • CONFIRMED / HIGH / MEDIUM / LOW / CANDIDATE grades
  • Ranked output — highest confidence first
09

STRIKE

PIVOT CONTROLLER

Once a CONFIRMED or HIGH confidence origin is established, STRIKE automatically invokes WRAITH against the raw origin IP — bypassing the CDN entirely. Full WARLORD ANNIHILATE chain also supported. Requires UNLEASHED gate.

  • WRAITH scan auto-invoke against confirmed origin
  • WARLORD ANNIHILATE chain (--chain annihilate)
  • Correct Host header passed to WRAITH for web fingerprinting
  • Parallel pivot against all confirmed origins
  • UNLEASHED gate: --override + --confirm-destroy required
10

HERALD

REPORT GENERATION

Produces a complete structured JSON report for every engagement. Records every candidate IP, all discovery methods used, confidence scores, verification results, server fingerprints, and pivot execution details. Timestamped. Saved to reports/ directory.

  • Structured JSON report — full dataclass serialisation
  • Per-candidate: methods, confidence, WAF status, server
  • Pivot execution record — command, exit code, output
  • Rich console output at every phase
  • Report ID: SHD-RPT-{hex} format

Three Modes. One Command.

SHROUD runs from a single CLI entry point. Discovery-only mode requires no authorisation. Full verification mode probes all candidates directly. Auto-pivot fires WRAITH at every confirmed origin and requires the UNLEASHED dual gate.

Mode 1 — Discovery Only (no gate required)
$ shroud scan --target example.com --mode discovery-only

[ PHASE 1 — DISCOVERY ] Target: example.com
VEIL  Parsing SPF records...
  ✓ VEIL: 12 IP(s) via SPF — 203.0.113.1, 198.51.100.5...
ATLAS Mining certificate transparency logs (crt.sh)...
  ✓ ATLAS: 4 IP(s) from 847 CT entries
TRACE Querying historical DNS records...
  ✓ TRACE: 3 IP(s), 6 subdomains
SWEEP Enumerating subdomains...
  ✓ SWEEP: 2 IP(s) from 8 resolved subdomains (14 CDN-filtered)
Discovery complete: 18 unique candidate IPs
Mode 2 — Full Scan (discovery + verification)
$ shroud scan --target example.com --mode full --keywords "example,contact"

[ PHASE 2 — VERIFICATION ] Probing 18 candidate IPs...
WAF BYPASSED: 2 confirmed origin(s):
  → 203.0.113.42
  → 198.51.100.22
CONFIRMED ORIGIN(S):
  → 203.0.113.42 confidence=CONFIRMED (1.00) server=nginx/1.24.0
  → 198.51.100.22 confidence=HIGH (0.85) server=LiteSpeed
Mode 3 — Auto-Pivot (UNLEASHED gate required)
$ shroud scan --target example.com --mode full \
    --auto-pivot --override --confirm-destroy

━━━ UNLEASHED MODE ACTIVE ━━━
[ PHASE 3 — STRIKE ] Pivoting to 2 confirmed origin(s)...
  → 203.0.113.42 via wraith — SUCCESS
     Command: wraith scan --target 203.0.113.42 --host example.com
     Report:  reports/wraith_203_0_113_42_a1b2c3.json
Utility Commands
$ shroud subsystems            # List all 10 subsystems
$ shroud capabilities          # Show discovery methods and pivot chains
$ shroud unleashed status       # UNLEASHED gate key fingerprint
$ shroud unleashed create-scope --targets example.com --days 30
$ shroud scan -t example.com --chain annihilate --override --confirm-destroy

Discover. Verify. Strike.

Three phases, executed in sequence. Phase 1 discovers candidate IPs from all available intelligence sources. Phase 2 verifies each candidate by connecting directly — confirming real content and WAF absence. Phase 3 fires WRAITH at every confirmed origin, bypassing the CDN entirely.

Phase 1
DISCOVERY
VEIL + ATLAS + TRACE + SENSOR + SWEEP — five independent intelligence channels converge on candidate origin IPs
Phase 2
VERIFICATION
PROBE + MARK + SCORE — direct HTTP requests confirm target content and WAF absence. Confidence scored and ranked.
Phase 3 — UNLEASHED
STRIKE
STRIKE + HERALD — WRAITH auto-invoked against confirmed origin. Full JSON report saved. CDN completely bypassed.

UNLEASHED Gate — Dual-Key Authorization

Discovery and verification run without any gate — SHROUD can map any target's defensive perimeter without authorisation flags. The STRIKE phase — invoking WRAITH or WARLORD against the confirmed origin — requires both UNLEASHED flags simultaneously. This gate cannot be bypassed in software. The origin will not be pivoted at without explicit operator consent on every invocation.

Discovery Mode

No flags required. SPF parsing, CT log mining, historical DNS, Shodan queries, and subdomain enumeration run freely. Maps the attack surface without touching any target infrastructure directly.

Verification Mode

Direct HTTP probes to candidate IPs. Confirms origin with real network requests. WAF bypass confirmed. Server fingerprinted. Confidence scored. No --override required for verification alone.

STRIKE Mode

Requires --override AND --confirm-destroy. Both flags must be present. WRAITH is invoked against the confirmed origin. Ed25519 key at ~/.red-specter/shroud/unleashed.key. Authorised operators only.

10
Subsystems
5
Discovery Methods
52
Bypass Subdomains
192
Tests
NIGHTFALL
#44
Authorised Operators Only

SHROUD is available to authorised penetration testers and red team operators under engagement contract. Not for public distribution.

Documentation Contact

Authorised Use Only

Red Specter SHROUD is a commercial penetration testing tool available exclusively to authorised security professionals operating under signed engagement contracts and with explicit written permission from target system owners. Unauthorised use against systems you do not own or have permission to test is illegal in most jurisdictions and is not condoned by Red Specter Security Research Ltd (Company No. 17106988). All operator actions are logged, signed, and attributable.