githubEdit

Information Gathering

Passive reconnaissance

➡️ Physical engagement / Social engineering

  • Location information like

    • satellite images

    • drone recon

    • building layout (badge readers, security, fencing, etc)

  • Job information

    • employees (name, job title, phone number, etc)

    • pictures (badge photos, desk photos, computer photos, etc)

➡️ Web / Host Assessment

  • target validation

    • whois, nslookup, dnsrecon

  • finding subdomains

    • Google, dig, nmap, crt.sh, etc

  • fingerprinting

    • nmap, wappalyzer, netcat, etc

  • data breaches

Target

❗ Always refer to a Bug Bounty program to find valid targets that can be legally tested

🔗 Bugcrowdarrow-up-right

  • Read the program details, follow the terms and stay in scope

  • Following test will be made on the *.tesla.com target


Discovering email addresses

  • The goal is discovering public email addresses and check if they really exist

➡️ Hunter.ioarrow-up-right (free registration) - Find email addresses from any company name or website

Hunter.io

➡️ Phonebook.czarrow-up-right (free registration) - Phonebook lists all domains, email addresses, or URLs for the given input domain

➡️ VoilaNorbertarrow-up-right

➡️ Clearbit Connectarrow-up-right (Chrome extension)

➡️ EmailHippo Email address verifiyarrow-up-right - Free email address verification tool

➡️ Email-checkerarrow-up-right


Breached credentials

➡️ HaveIBeenPwnedarrow-up-right - Check if your email address is in a data breach

➡️ breach-parsearrow-up-right - A tool for parsing breached passwords

  • BreachCompilation password list (44GB) file comes from breached password dumps

Credential stuffing and Password spraying can be done using the results.

➡️ DeHashed.comarrow-up-right (subscription) - public data search-engine

  • Hashed passwords or other data can be found

  • Collect all the data (email, username, IP, address, etc) with the goal to find patterns, that could be related to personal accounts too

  • Investigation to tie the data to other accounts, etc

  • Use tools to try to decrypt the hashed password, like Hashes.comarrow-up-right, Google, etc

DeHashed.com

Hunting subdomains

Identify subdomains

➡️ Sublist3rarrow-up-right (outdated) - enumerate subdomains of websites using OSINT

➡️ crt.sharrow-up-right - look for registered certificates and find subdomains or sub-subdomains

crt.sh

➡️ amassarrow-up-right - in-depth attack surface mapping and asset discovery

amass enum -d tesla.com
amass enum -d syselement.com

➡️ httprobearrow-up-right - take a list of domains and probe for working (alive) http and https servers

➡️ assetfinderarrow-up-right - find domains and subdomains related to a given domain


Screenshotting websites

➡️ gowitnessarrow-up-right - A golang, web screenshot utility using Chrome Headless


Website technologies

➡️ BuiltWith.comarrow-up-right - find out what websites are built with

BuiltWith.com

➡️ Wappalyzer.comarrow-up-right - via browser extension

  • by visiting the webpage, interact with the browser extension to check the website technologies

➡️ WhatWebarrow-up-right


Automated recon script

  • Little bash script for sub-domains hunting

➡️ sumreconarrow-up-right - web recon script

  • TCM's modified final script

    • Creates a directory structure for reconnaissance under a given URL

    • Harvests subdomains using assetfinder

    • Filters valid subdomains and saves them to final.txt

    • Checks for live domains using httprobe

    • Identifies potential subdomain takeovers using subjack

    • Scans for open ports using nmap

    • Scrapes archived URLs from waybackurls

    • Extracts parameters from Wayback Machine data

    • Categorizes JavaScript, PHP, JSON, JSP, and ASPX files from Wayback Machine data

    • Removes temporary files to keep the structure clean

    • (Commented out) Could run amass for subdomain discovery and use EyeWitness for screenshots


Using Burpsuite

➡️ Burp Suitearrow-up-right


Google Fu

➡️ Google.comarrow-up-right


Social Media


Last updated