Information Gathering - Some One-liners
Last updated
Last updated
To do list:
Get IP address of our target
Domain Name Server Information and DNS Records
Make recon about the technologies used on the website
Look for Subdomains, Unlisted files, directories etc.
Port Scanning
dig <domain>
https://whois.domaintools.com/ - Simple Whois
https://whois.arin.net/ui/ - WhoisRWS
https://www.robtex.com/ - Robtex
https://dnsdumpster.com/ - DNS Dumpster
Tools to use:
sublit3r.py -d pepsi.com
Tools for directory brute force:
dirsearch --url http://domain.com # Basic enum
nmap -A -F -T1 - vvv <IP>
nmap -iL subdoms.txt -T5
#Remeber to identify false positives
aws s3 cp s3://Bucket_name/file
https://www.shodan.io/ - Look for Organizations name, hostnames and others.
https://netlas.io/ - Same as nmap, look for vulnerable servers and so on.
dnstwist - recollect info about registered domains and unregistered domains.
Github
OSINT
PasteBin
Enumall