Recon
Blog / Articles / Presentations / Videos:
Recon and Discovery - https://www.youtube.com/watch?v=La3iWKRX-tE
Doing Recon Like a Boss - https://www.youtube.com/watch?v=1Kg0_53ZEq8
Recon Everything - https://medium.com/@maverickNerd/recon-everything-48aafbb8987
Recon Notes - https://mavericknerd.github.io/knowledgebase/
100 Ways to Discover - https://sylarsec.com/2019/01/11/100-ways-to-discover-part-1/
Asset Enumeration - https://captmeelo.com/bugbounty/2019/09/02/asset-enumeration.html
Hacking Process - Recon - https://www.youtube.com/watch?v=1bivJl0B_bs&feature=youtu.be
Google Dorks - https://ahrefs.com/blog/google-advanced-search-operators/
https://blog.ujwalkr.com/Google-Dorks-Recon/ - Goolgle Dork
DORK: inurl:wp-config-backup.txt
Google Dork - https://github.com/SKVNDR/FastDork
Tools:
AutoRecon - https://github.com/JoshuaMart/AutoRecon
https://dnsdumpster.com/ https://github.com/codingo/Reconnoitre NerdyData BuitWith hunter.io
https://github.com/michenriksen/aquatone Censys Robtex Shodan Whoxy https://github.com/DataSploit/datasploit
https://github.com/reconned/domained -- has multiple tools inbuilt
Automation for Open Threat Exchange - https://github.com/remonsec/Pri0tx
Simple tool for get domain relationship.. https://raw.githubusercontent.com/m4ll0k/Bug-Bounty-Toolz/master/getrelationship.py… -@Jhaddix@TomNomNom@stokfredrik@NahamSec@Yassineaboukir #bugbountytips #BugBounty
Recon Cheatsheet:
Awesome Asset Discovery - https://github.com/redhuntlabs/Awesome-Asset-Discovery
Twitter Threads:
Getting info about Domains than subdomains - https://twitter.com/gwendallecoguic/status/1187000587612762112
If the scope is http://example.com only - https://twitter.com/imhaxormad/status/1118289299152072706
https://twitter.com/hakluke/status/1199266508280434689 - ASN - whois -h http://whois.cymru.com $(dig +short http://tesla.com)
Quickly get the ASN of an IP address, along with the associated company name and location: curl http://ipinfo.io<ip> This is a great way to confirm ownership of an IP/domain. It also is a great way to services that might be in use (AWS/Azure/Cloudfront/Akamai, etc.)
Massscan - Take a list of subdomains, resolve them to an IP, remove duplicates and scan each with masscan.
masscan --rate 10000 -p1-65535 $(<subdomains.txt xargs -I % getent hosts % | awk {'print $1'} | sort -u | tr '\n' ',' | sed 's/,$//')
saw this a while ago it might help someone. curl -fsSL "https://crt.sh/?CN=%25.%25.att.com&exclude=expired …" | pup 'td :contains(".att.com") text{}' | sort -n | uniq -c | sort -rn | column -t > /root/Desktop/att-recon/ok.txt
ASN, CIDR => amass intel => enumeration script 'amass with api keys, findomain with api keys, and subfinder' => massDNS => httprobe => sort live and dead hosts => run a subtakeover script => hakcrawler
Post Recon - https://twitter.com/jobertabma/status/998769037445230592
Asset Discovery tool -https://twitter.com/NahamSec/status/1260639679696629760
Last updated