SEC-335: Eth. Hacking & Pen. Testing
HomeTech JournalsPersonal ProjectsSysadmin Wiki
  • SEC-335: Eth. Hacking & Pen. Testing
  • Breakdown
    • Course Overview
  • Activities/Assignments
    • Assignment 1.2: The Kali Virtual Machine
    • Activity 2.1: Host Discovery
    • Activity 3.1: DNS Enumeration
    • Activity 4.1: Exploiting Cupcake
    • Assignment 5.1: Breaking into Kali
  • Labs
    • Lab 2.1: Port Scanning 1
    • Lab 2.2: Port Scanning 2
    • Lab 3.1: Powershell and DNS
    • Lab 3.2: DNS uses TCP and UDP
    • Lab 5.1: Password Guessing
    • Lab 6.1: Cracking Linux Passwords with JtR and Hashcat
    • Lab 7.1: Exploiting pippin.shire.org (10.0.5.25)
    • Lab 8.1: Weevely
    • Lab 8.2: Reverse Shell
    • Lab 9.1: Exploit Gloin
    • Lab 10.1: Linux - Permission Vulnerabilities
    • Lab 10.2: Exploiting nancurunir
    • Lab 11.1: Metasploit
    • Final: Bree
  • Tools/Recon
    • Metasploit
    • NMAP
    • Active/Passive Reconnaissance
    • Shodan
    • The Harvester
    • Netcraft
    • Metagoofil
    • DNS-Enumeration
    • CEWL
    • rsmangler
    • Hydra
    • DIRB
    • John the Ripper
    • Hashcat
    • Passwords
    • TMP
Powered by GitBook
On this page
  • Goals of Recon
  • Passive Reconnaissance
  • Tools/Strategies
  • Active Reconnaissance
  • Tools/Strategies
  1. Tools/Recon

Active/Passive Reconnaissance

PreviousNMAPNextShodan

Last updated 2 years ago

Goals of Recon

  • Network Information (IPs, CIDR, Domains)

  • Systems (Server Names/IPs)

  • Web Applications

  • Security Tools (Firewalls, IDS/IPs, Endpoint Security)

  • People (Leadership, Admins, Engineers, Developers, etc.)

  • Partners (Vendors, Hosting Providers)

Passive Reconnaissance

Mostly OSINT, Publicly available information

Tools/Strategies

  • ICANN

  • Domain Registration (contact names, addresses, nameserver info)

  • IP Addresses Registration

    • Internet Assigned Numbers Authority (IANA) - Five regions

      • AfriNIC - Africa

      • APNIC - Asia/Pacific

      • ARIN - North America

      • LACNIC - Latin America and Caribbean

      • RIPE = Europe, Middle East, Central Asia

  • Google Dorking

    • Aka Google hacking

  • Shodan

  • The Harvester

    • Command line tool to query multiple search engines

    • Included in Kali, but has had issues in the past

  • Netcraft

    • Provides technical reports on other websites

  • Metagoofil (Technically not Passive because you interact with the host but can give larger insight into the target)

    • Kali utility that is designed for extracting metadata from public documents

  • DNS

    • Nslookup and Dig are useful command line tools

    • Dnsrecon (included in kali) offers a streamlined approach to gathering data, however, pull down the latest version

    • MxToolbox

      • Find email services provider, DNS information, WhoIs information, and more

Active Reconnaissance

Interacting Directly with the the target - Needs Permission in going beyond public access

Tools/Strategies

  • Nmap

    • Network scanner that can be found on kali

    • Can give you good guesses as to what targets are open to the public

    • If inside the network can help with finding services

      • This can/will set off many "alarms" depending on how the network is setup

    • Looks at it's database for vulnerabilities on web servers.

Nikto Website scanner

https://www.shodan.io/
https://www.cirt.net/nikto2/