Reconnaissance
Last modified: 2024-09-25
Basic reconnaisance flows.
Automation
Acquisitions
We need to find the other companies which are owned by the target company.
ASN
An autonomous system number (ASN) is a collection of connected IP routing prefixes under the control of network operators. It is assigned to an autonomous system (AS) by the Internet Assigned Numbers Authority (IANA).
Border Gateway Protocol (BGP) is used to notify the routing policy to the other AS or routers.
We can also find IP ranges belonging to the ASN.
WHOIS
whois is used to find information about the registered users of the domain.
whois example.com
Archived Web Pages
Wayback Machine is an online tool that archives a lot of websites.
Subnet Scan
You need only the ping scan (skip port scan) by adding the option "-sP".
# /24 - 255.255.255.0
nmap -sP <target-ip>/24 -T2
# /16 - 255.255.0.0
nmap -sP <target-ip>/16 -T2
# /8 - 255.0.0.0
nmap -sP <target-ip>/8 -T2
Port Scan
See Port Scan for details.
Subdomains
See also Subdomain Discovery, DNS Pentesting.
Google Search
For example, input site:facebook.com
in the search form. We should see a list of subdomains for the facebook.com.
VirusTotal
For example, input "facebook.com" in the search form of the URL section. We shoud see a list of subdomains for the facebook.com in the RELATIONS
section.
-
Subdomain Takeover
It allows an adversary to claim and take control of the victim's subdomain.
Resource: OWASP
Social Accounts
We can get more information if the organization uses social platforms as below.
- Discord
- GitHub
- Mastodon
Trace Route Packets
To track the route packets from our IP to target host, run the following command.
traceroute example.com
Find Vulnerabilites
Automation
-
Nuclei
Nuclei is a vulnerability scanner based on simple YAML based DSL.
nuclei -h
Exploit DB
You can search vulnerabilites written in Exploit-DB by using "searhsploit".
searchsploit <keyword>
If you found vulnerabilities of target, copy them to current directory.
For example,
searchsploit -m windows/remote/42031.py
# or
searchsploit -m 42031
Exploit-DB is a database of exploits.
Find the exploit and download it. For example:
wget https://www.exploit-db.com/raw/42966 -O exploit.py
Format the exploit code for UNIX.
dos2unix exploit.py
# Manual converting
sed -i 's/\r//' example.py