The tech blog is much better: https://www.zafran.io/resources/breaking-waf-technical-analysis
It boils down to scanning all IPV4 space, and grabbing the SSL certificate returned by any webservers on port 443. If the server is incorrectly configured the fields in the SSL cert will tell you what domains it serves. And using Certificate Transparency logs to figure out what domains you want to target. I wouldn’t really call this a flaw that breaks anything. It’s just a byproduct of how SSL, IPV4, and WAFs work.
From the article:
So apparently the real issue is that people aren’t using SNI correctly.