-
3.1 Passive Reconnaissance
-
Subdomain enumeration (passive)
-
subfinder -d target.com -all -recursive -o subs.txt
-
amass enum -passive -d target.com -o amass_subs.txt
-
assetfinder –subs-only target.com >> subs.txt
-
Certificate transparency
-
curl ‘https://crt.sh/?q=%.target.com&output=json’ | jq ‘.[].name_value’ | sort -u
-
Historical URLs
-
gau target.com | tee urls_gau.txt
-
waybackurls target.com | tee urls_wayback.txt
-
Google dorks
-
Shodan / Censys
-
3.2 Active Reconnaissance
-
Probe live subdomains
-
cat subs.txt | httpx -title -tech-detect -status-code -o live_subs.txt
-
Port scanning
-
nmap -sV -sC -p- –open -oA nmap_target target.com
-
masscan -p1-65535 10.0.0.0/24 –rate=1000
-
Directory / endpoint bruteforce
-
ffuf -w /opt/SecLists/Discovery/Web-Content/raft-large-directories.txt (case 1)
-
ffuf -u https://target.com/FUZZ -mc 200,204,301,302,307,401,403
-
gobuster dir -u https://target.com
-
gobuster -w /opt/SecLists/Discovery/Web-Content/common.txt
-
gobuster -x php,html,js,json,txt -t 50
-
Virtual host enumeration
-
ffuf -w /opt/SecLists/Discovery/DNS/subdomains-top1million-5000.txt
-
ffuf -H ‘Host: FUZZ.target.com’ -u https://target.com -mc 200
-
3.3 JavaScript Analysis
-
Extract JS files from crawl
-
Download and analyze
-
Find endpoints & secrets in JS
-
3.4 Technology Fingerprinting
-
Wappalyzer: browser extension for instant stack detection
-
whatweb: command-line tech fingerprinting
-
builtwith.com: historical technology data
-
Check response headers: Server, X-Powered-By, X-Framework
-
Check cookies: PHPSESSID=PHP, JSESSIONID=Java, .ASPXAUTH=ASP.NET
-
3.5 Recon Automation (building bash tool)