Automate OSINT techniques
The Harvester
python3 theHarvester.py -d <target_domain> -b allAmass
# Search for domain names associated with target domain through reverse whois:
amass intel -d <target_domain> -whois
# Search for company name is ASN names:
amass intel -org <target_organization>
# Search for domain names, associated IP addresses in an ASN, and prints where Amass found them:
amass intel -asn <target_asn> -ip -src
# Search for subdomains found strictly in open-source intelligence resources:
amass enum -d <target_domain> -passive
# Search for subdomains and verify info about the host through direct connections:
amass enum -d <target_domain> -active
# Brute force subdomains using a mask of aaa-[a-z][a-z][a-z]:
amass enum -d <target_domain> -active -brute -wm "aaa-?l?l?l" Recon-ng
Last updated