Passive Information Gathering
Passive Information Gathering is the process of collecting openly available information about a target, generally without any direct interaction with that target.
Website Recon
- Just browse the site
- About page to get email and similar files
- understand the email schema
- Social Media presence
- About page to get email and similar files
Whois Enumeration
- Forward lookup:
whois domain.tld | less
- Get the name of the person in charge (probably high privilege)
- Get the NameServers
- Reverse lookup:
whois 1.1.1.1 | less
- Get who is hosting the IP
Google Hacking
- Using Search engines and their operators to uncover information
site:
: Limit the results to a single domainext:
orfiletype:
: Limit the results to a specific filetype- prepend
-
to remove certain results intitle:"index of" "parent directory"
: Directory listing pages
- https://exploit-db.com/google-hacking-database
For more, see Dorking
Netcraft
- https://searchdns.netcraft.com: Search for domains containing xyz
- https://sitereport.netcraft.com/?url=http://identity.swissre.com
- Find technologies used by the site
- https://sitereport.netcraft.com/?url=http://identity.swissre.com
Recon-ng
- Run:
recon-ng
marketplace search github
: search for modules that containgithub
K
marks that the module needs some soft of credentials- https://github.com/lanmaster53/recon-ng-marketplace/wiki/API-Keys
marketplace info recon/domains-hosts/google_site_web
: get more information about a specific modulemarketplace install recon/domains-hosts/google_site_web
: Install a modulemarketplace load recon/domains-hosts/google_site_web
: Load a module- Once loaded type
info
help options set SOURCE megacropone.com
: to set theSOURCE
optionrun
: to run the module
- Once loaded type
recon-ng
: Stores its output into a local database and uses it for other modulesshow hosts
: to show thehosts
database
Open-Source Code
- Search for the languages and sensitive data on Github, GitLab or SourceForge
- Github
Shodan
- https://shodan.io
- Searches to any devices connected to the internet, not just web server
hostname:megacorpone.com
Security Headers Scanner
- Scan the security headers of a site: https://securityheaders.com
SSL Server Test
- Search for SSL/TLS vulnerabilities: https://www.ssllabs.com/ssltest
- Get a feel for the security practices of a org
Pastebin
User Information Gathering
- Gather information on the employees to:
- Define password lists
- Social Engineering
- Phishing
- Credential Stuffing
- etc.
Email Harvesting
- Search multiple sources:
theharvester -d megacorpone.com -b google
Social Media Tools
- Identify employees and the companies structure
https://social-searcher.com
Site-Specific Tools
- Search a Twitter feed and generate a wordlist: https://digi.ninja/projects/twofi.php
- Generate username lists based on a LinkedIn Org. https://github.com/initstring/linkedin2username
Social Media Tools
Stack Overflow
- https://stackoverflow.com
- If we can link a user to a stack overflow account we can see what questions their asking to determine the tech stack
Information Gathering Frameworks
OSINT Framework
Maltego
- https://www.paterva.com/index.php
- Included in Kali
Relevant Note(s): Active Information Gathering Penetration Testing