Recon 101 - Beginner
Covers both passive and active reconnaissance techniques, providing a comprehensive guide for collecting information about the target organization.
Recon 101 - Beginner
Target Information:
- Company Name
- Domain
- IP Range
1. Passive Reconnaissance
Open Source Intelligence (OSINT):
- Tools : Netlas, Shodan, Censys, Maltego, theHarvester, Recon-ng
- Techniques
- Google Dorking: Use advanced search operators to find sensitive information.
- Social Media Analysis: Gather information from LinkedIn, Twitter, and Facebook.
- Public Databases: Search for information in public databases such as EDGAR, public records, and industry databases.
DNS Reconnaissance:
- Tools : DNSdumpster, Fierce, DNSRecon, Sublist3r, Amass, Subfinder
- Techniques
- Domain and Subdomain Enumeration: Identify all domains and subdomains associated with the target.
- WHOIS Lookup: Obtain registration information for the target’s domain.
Website Analysis:
- Tools : Wappalyzer, Builtwith, WhatWeb, Burpsuite
- Techniques
- Identify Web Technologies: Determine the technologies used by the target’s website (e.g., CMS, frameworks).
- Sitemap Analysis: Review the sitemap to understand the website structure.
- Analyze robots.txt: Identify areas of the website that the target does not want to be indexed by search engines.
Network Reconnaissance:
- Tools : Shodan, Censys
- Techniques
- Open Ports and Services: Identify open ports and services running on the target’s network.
- Network Range Identification: Determine the range of IP addresses used by the target.
2. Active Reconnaissance
Network Scanning:
- Tools : Nmap, Masscan, Angry IP Scanner
- Techniques
- IP Range Scanning: Scan IP addresses in any range and their ports
- Port Scanning: Identify open ports on the target’s systems.
- Service Version Detection: Determine the versions of services running on open ports.
- OS Fingerprinting: Identify the operating systems running on target systems.
Vulnerability Scanning:
- Tools : Nessus, OpenVAS, Nexpose
- Techniques
- Automated Vulnerability Scanning: Use tools to scan for known vulnerabilities.
- Manual Verification: Verify findings from automated scans manually.
Social Engineering:
- Techniques
- Phishing Emails: Send phishing emails to gather credentials or deliver payloads.
- Pretext Calls: Call employees under a pretext to gather information.
- Physical Reconnaissance: Visit the target’s physical location to gather information.
Wireless Reconnaissance:
- Techniques
- Identify Wireless Networks: Detect wireless networks in the vicinity of the target.
- Capture and Analyze Traffic: Capture wireless traffic for analysis.
This post is licensed under CC BY 4.0 by the author.