Virtual Host
A Virtual Host (VHOST) is a mechanism used by web servers (e.g., Apache, Nginx, IIS) to host multiple domains or subdomains on a single IP address. When enumerating a webserver, default requests often target the primary or default VHOST only. Hidden hosts may expose extra functionality or vulnerabilities.
Summary
Tools
- wdahlenburg/VhostFinder - Identify virtual hosts by similarity comparison.
- codingo/VHostScan - A virtual host scanner that can be used with pivot tools, detect catch-all scenarios, aliases and dynamic default pages.
-
hakluke/hakoriginfinder - Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs.
-
OJ/gobuster - Directory/File, DNS and VHost busting tool written in Go.
Methodology
When a web server hosts multiple websites on the same IP address, it uses Virtual Hosting to decide which site to serve when a request comes in.
In HTTP/1.1 and above, every request must contain a Host
header:
This header tells the server which domain the client is trying to reach.
- If the server only has one site: The
Host
header is often ignored or set to a default. - If the server has multiple virtual hosts: The web server uses the
Host
header to route the request internally to the right content.
Suppose the server is configured like:
<VirtualHost *:80>
ServerName site-a.com
DocumentRoot /var/www/a
</VirtualHost>
<VirtualHost *:80>
ServerName site-b.com
DocumentRoot /var/www/b
</VirtualHost>
A request with the default host ("site-a.com") returns the content for Site A.
A request with an altered host ("site-b.com") returns content for Site B (possibly revealing something new).
Fingerprinting VHOSTs
Setting Host
to other known or guessed domains may give different responses.
Common indicators that you're hitting a different VHOST:
- Different HTML titles, meta descriptions, or brand names
- Different HTTP Content-Length / body size
- Different status codes (200 vs. 403 or redirect)
- Custom error pages
- Redirect chains to completely different domains
- Certificates with Subject Alternative Names listing other domains
NOTE: Leverage DNS history records to identify old IP addresses previously associated with your target’s domains. Then test (or "spray") the current domain names against those IPs. If successful, this can reveal the server’s real address, allowing you to bypass protections like Cloudflare or other WAFs by interacting directly with the origin server.