1.External Recon and Enumeration Principles
Core Principles
Passive vs. Active Reconnaissance:
Passive: Gathering information without directly interacting with the target's systems (e.g., searching public databases, social media).
Active: Directly interacting with the target's systems (e.g., scanning ports, probing services).
Scoping: Defining the boundaries of the engagement to avoid unintended consequences.
Information Gathering: The primary goal is to collect as much relevant information as possible about the target.
Iterative Process: Reconnaissance is not a one-time event; it's an ongoing process throughout the penetration test.
OSINT (Open-Source Intelligence): Utilizing publicly available information to gather intelligence.
Key Data Points:
IP Space: Identifying the target's network ranges and ASNs.
Domain Information: Discovering domain names, subdomains, DNS records, and registrars.
Schema Formats: Understanding naming conventions for usernames, email addresses, and other identifiers.
Data Disclosures: Finding publicly accessible documents, files, and other data that may contain sensitive information.
Breach Data: Identifying compromised credentials and other leaked data.
Essential Techniques:
DNS Enumeration: Querying DNS servers to discover domain information.
Social Media Analysis: Gathering information from social media platforms.
Website Analysis: Examining the target's website for information and vulnerabilities.
Google Dorking: Using advanced search operators to find specific information.
Credential Hunting: Searching for leaked credentials in breach data sources.
Subdomain Enumeration: Discovering subdomains associated with the target domain.
ASN lookups: Discovering the owner of IP address blocks.
Key Tools:
nslookup/dig: For DNS queries.
whois: For domain registration information.
BGP Toolkit: For ASN and IP address information.
Shodan/Censys: For discovering exposed devices and services.
Dehashed/HaveIBeenPwned: For checking breach data.
Sublist3r/Amass: For subdomain enumeration.
Trufflehog: For finding secrets in code repositories.
Domaintools/Viewdns.info: For domain information.
Ethical Considerations:
Staying Within Scope: Adhering to the agreed-upon boundaries of the engagement.
Obtaining Authorization: Ensuring that you have explicit permission to perform reconnaissance and penetration testing.
Protecting Sensitive Information: Handling any sensitive information that you discover responsibly.
Avoiding Unintended Harm: Taking precautions to avoid disrupting the target's systems or services.
Last updated