Information Gathering - Some One-liners

Web Pentesting Recon

To do list:

  • Get IP address of our target

  • Domain Name Server Information and DNS Records

  • Make recon about the technologies used on the website

  • Look for Subdomains, Unlisted files, directories etc.

  • Port Scanning

Get IP address

  • dig <domain>

Whois Lookup

Netcraft && Builtwith

Robtex DNS Lookup

Subdomains

Tools to use:

sublit3r.py -d pepsi.com

Discovering Sensitive files

Tools for directory brute force:

dirsearch --url http://domain.com # Basic enum

Alive Domains

cat subdomains.txt | httpx -sc -title

Port Scanning

nmap -A -F -T1 - vvv <IP>

nmap -iL subdoms.txt -T5

#Remeber to identify false positives

Hakrawler

LinkFinder

ScreenShots

cat alive-subdomains.txt | aquatone
eyewitness -f /root/alive-https.txt -d <domain> --all-protocols

Third Party Hosting

Search Engines

Phishing Domains and Typosquatting

  • dnstwist - recollect info about registered domains and unregistered domains.

dnstwist -r pepsi.com
dnstwist pepsi.com

Discovering Email Addresses

pageDiscovering Email Address

Others

  • Github

  • OSINT

  • PasteBin

All in One

  • Enumall

enumall.py pepsi.com -a -p ../alt/dns/words.txt -w <custom_wordlist>

Last updated