Recon Notes
Reconnaissance and Information Gathering Notes
Tool is nothing, understanding methodolgy is everyting!!!
Initial Informating Gathering
- https://builtwith.com
- **wappalyzer browser add ons**
- curl -I https://azena.com
- curl -I -L https://azena.com // -L means follow redirect
- https://securityheaders.com
- nmap -p 80,443 -A azena.com
Directory Enumeration And Brute Forcing
ffuf --help
ffuf -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt:FUZZ -u http://10.10.10.10/FUZZ // non recursive by default
dirb http://10.10.10.10 // use own wordlists, scan recusively
dirbuster ---> GUI
Subdomain Enumeration
google :
site:azena.com -www
site:azena.com -www -store
site:azena.com filetype:pdf
site:azena.com filetype:pdf password
https://crt.sh ----> %.azena.com
subfinder -d azena.com
assetfinder azena.com | grep azena.com | sort -u > azenasubdomain.txt
amass enum -d azena.com > azenasubdomain2.txt
is subdomain alive ? ---> cat azenasubdomain.txt | grep azena.com | sort -u | httprobe -prefer-https | grep https > azenaalive.txt
mkdir azenapics
gowitness file -f azenaalive.txt -P azenapics --no-http //not not use https:// in the domain file just write hostname