Information Gathering
Whois
Whois [🔗] is a protocol used for querying databases that store an Internet resource's registered users or assignees. You can provide:
Domain -> info about it such as name server, registrar, etc.
IP -> info about who is hostring the IP address
Netcraft
Netcraft is an ISP, that offers a free web portal [🔗] for information gathering (technologies, subdomains, etc.).
Open-Source Code
Gather information through GitHub, GitLab, etc.
Manual
Automatic
Google Dorks
Example
Shodan
Shodan [🔗] is a search engine for internet-connected devices, including servers, routers, and IoT devices.
DNS Enumeration
Manual
Note: AXFR offers no authentication, so any client can ask a DNS server for a copy of the entire zone.
Automatic
There are several tools...
dnsrecon [🔗]
sublist3r [🔗] enumerates subdomains using search engines such as Google and using DNSdumpster etc. It support also bruteforce.
All in one
amass [🔗]: network mapping and external asset discovery using open source information gathering and active reconnaissance techniques
theHarvester [🔗]: gathers names, emails, IPs, subdomains, and URLs by using multiple public resources
Port Scanning
Netcat [🔗]
Nmap [🔗]
Note: 1000-port scan generate around 72KB of traffic. Scanning all ports generate about 4 MB. 254 hosts * 4 MB = 1000 MB of traffic.
Host Discovery (nmap)
-sn option
The default host discovery done with -sn
consists of an ICMP echo request. But when a privileged user tries to scan targets on a local ethernet network, ARP requests are used.
-PS option
This option sends an empty TCP packet with the SYN flag set. The default destination port is 80.
Note: you should also use other ports to better detect hosts.
nmap -sn -PS22-25 192.168.1.5
Other options
-PA
(ACK flag is set instead of the SYN flag). Default port: 80-PU
(sends a UDP packet). Default port: 40125-PY
(sends an SCTP packet). Default port: 80
Port Scanning (nmap)
Use nmap documentation to understand the differences between port scans
Script engine: For more info read nmap documentation
--script <filename>|<category>|<directory>|<expression>
-sC
Runs a script scan using the default script set. It is the equivalent of--script=default
Note: there are many categories. Some of the scripts in this category are considered intrusive and may not run on a network target without permissions.
Website Recon
Web App Technology Fingerprinting
wappalyzer (extension)
builtwith (extension)
whatweb example.com
Look for hidden directory/files:
http://example.com/robots.txt
http://example.com/sitemap.xml
WAF Detection
wafw00f http://example.com -a
Download website source
httrack
waybackmachine
Last updated