General objectives
- Identify IP addresses and Domains and subnets
- Identify 3rd-Party sites and their relationships
- Identify people
- Identify technologies
- Identify content of interest
- Identify vulnerabilities
Organizing template
- Organization
- Goals
- Mergers and Acquisitions
- Projects and Products
- News
- Infrastructure
- IPs
- Hostnames
- Used software
- Used hardware
- Employees
- Usernames
- Emails
- Roles
- Breached credentials
Web ressources
- Hunter.io
- Search engine for email addresses for domains.
- buildWith
- Crawler for detecting used technologies on a website.
- Google Hacking
- Whois Enumeration
- Netcraft
- Source code / repositor analysis (e.g. Github)
- Shodan (!) If you access Shodan via IPv6, they could later scan this network and neighbour hosts to detect IPv6 systems.
- Securityheaders.com
- Qualys SSL Test
Tools
- Spiderfoot
- Aggregation tool for many services. Web-based. Let it run for a while.
- Usage:
git clone https://github.com/smicallef/spiderfoot.gitsudo python3 ./sf.py -l 127.0.0.1:7777
- theHarvester
- Aggregation tool for many services.
- Usage:
python3 theHarvester.py -d $target_domain -b google
- p0f: Passive OS fingerprinting
Notes
- Search for files of your target. E.g. doc files from the organisation and analyse meta data to get insights into OS/Software versions.
Leave a Reply
You must be logged in to post a comment.