Information Gathering

Passive reconnaissance

โžก๏ธ Physical engagement / Social engineering

  • Location information like

    • satellite images

    • drone recon

    • building layout (badge readers, security, fencing, etc)

  • Job information

    • employees (name, job title, phone number, etc)

    • pictures (badge photos, desk photos, computer photos, etc)

โžก๏ธ Web / Host Assessment

  • target validation

    • whois, nslookup, dnsrecon

  • finding subdomains

    • Google, dig, nmap, crt.sh, etc

  • fingerprinting

    • nmap, wappalyzer, netcat, etc

  • data breaches

Target

โ— Always refer to a Bug Bounty program to find valid targets that can be legally tested

๐Ÿ”— Bugcrowd

  • Read the program details, follow the terms and stay in scope

  • Following test will be made on the *.tesla.com target


Discovering email addresses

  • The goal is discovering public email addresses and check if they really exist

โžก๏ธ Hunter.io (free registration) - Find email addresses from any company name or website

Hunter.io

โžก๏ธ Phonebook.cz (free registration) - Phonebook lists all domains, email addresses, or URLs for the given input domain

โžก๏ธ VoilaNorbert

โžก๏ธ Clearbit Connect (Chrome extension)

โžก๏ธ EmailHippo Email address verifiy - Free email address verification tool

โžก๏ธ Email-checker


Breached credentials

โžก๏ธ HaveIBeenPwned - Check if your email address is in a data breach

โžก๏ธ breach-parse - A tool for parsing breached passwords

  • BreachCompilation password list (44GB) file comes from breached password dumps

Credential stuffing and Password spraying can be done using the results.

โžก๏ธ DeHashed.com (subscription) - public data search-engine

  • Hashed passwords or other data can be found

  • Collect all the data (email, username, IP, address, etc) with the goal to find patterns, that could be related to personal accounts too

  • Investigation to tie the data to other accounts, etc

  • Use tools to try to decrypt the hashed password, like Hashes.com, Google, etc

DeHashed.com

Hunting subdomains

Identify subdomains

โžก๏ธ Sublist3r (outdated) - enumerate subdomains of websites using OSINT

โžก๏ธ crt.sh - look for registered certificates and find subdomains or sub-subdomains

crt.sh

โžก๏ธ amass - in-depth attack surface mapping and asset discovery

amass enum -d tesla.com
amass enum -d syselement.com

โžก๏ธ httprobe - take a list of domains and probe for working (alive) http and https servers

โžก๏ธ assetfinder - find domains and subdomains related to a given domain


Screenshotting websites

โžก๏ธ gowitness - A golang, web screenshot utility using Chrome Headless


Website technologies

โžก๏ธ BuiltWith.com - find out what websites are built with

BuiltWith.com

โžก๏ธ Wappalyzer.com - via browser extension

  • by visiting the webpage, interact with the browser extension to check the website technologies

โžก๏ธ WhatWeb


Automated recon script

  • Little bash script for sub-domains hunting

โžก๏ธ sumrecon - web recon script

  • TCM's modified final script

    • Creates a directory structure for reconnaissance under a given URL

    • Harvests subdomains using assetfinder

    • Filters valid subdomains and saves them to final.txt

    • Checks for live domains using httprobe

    • Identifies potential subdomain takeovers using subjack

    • Scans for open ports using nmap

    • Scrapes archived URLs from waybackurls

    • Extracts parameters from Wayback Machine data

    • Categorizes JavaScript, PHP, JSON, JSP, and ASPX files from Wayback Machine data

    • Removes temporary files to keep the structure clean

    • (Commented out) Could run amass for subdomain discovery and use EyeWitness for screenshots


Using Burpsuite

โžก๏ธ Burp Suite


Google Fu

โžก๏ธ Google.com


Social Media

  • Linkedin, Twiter (X) or other public websites can be used for some social media OSINT (Open-Source Intelligence).


Last updated

Was this helpful?