Reconnaissance & OSINT
60 min
Reconnaissance — The Art of Intelligence Gathering
Reconnaissance (recon) is the first and most important phase of ethical hacking. The more information gathered about a target, the higher the likelihood of finding exploitable vulnerabilities. It is divided into two types:
Passive Reconnaissance
Gather information without directly interacting with the target. Leaves no traces in target logs.
PASSIVE OSINT TECHNIQUES & TOOLS
─────────────────────────────────────────────────────────
Google Dorks → Advanced search operators
site:target.com filetype:pdf
intitle:"index of" site:target.com
inurl:admin site:target.com
WHOIS Lookup → Domain registration info
whois target.com → Registrant, name servers
DNS Analysis → subdomain discovery
dnsx, subfinder, amass, assetfinder
Shodan.io → Internet-connected device search
"apache" org:"Target Corp"
default password port:23
theHarvester → Emails, subdomains, hosts from public sources
LinkedIn/Social → Employee names, job roles, technologies used
Wayback Machine → Historical website content (web.archive.org)
Certificate CT → crt.sh — SSL certificate transparency logs
GitHub/GitLab → Exposed credentials, API keys, source code
─────────────────────────────────────────────────────────
Active Reconnaissance
Directly interact with target systems. May leave traces in logs. Only perform with authorization.
NMAP — THE ESSENTIAL SCANNER
──────────────────────────────────────────────
# Host Discovery
nmap -sn 192.168.1.0/24 # Ping sweep
# Port Scan
nmap -sV -sC -p- target.com # Full scan + service detection + scripts
# Stealth Scan
nmap -sS -T2 target.com # SYN scan (half-open)
# OS Detection
nmap -O target.com # OS fingerprinting
# Vulnerability Scan
nmap --script vuln target.com # Run vulnerability scripts
──────────────────────────────────────────────
Subdomain Enumeration
Finding subdomains expands the attack surface significantly. Tools: subfinder, amass, dnsx, gobuster dns
- Brute-force using wordlists (SecLists)
- DNS zone transfer (if misconfigured):
dig axfr @ns1.target.com target.com - Certificate transparency logs (crt.sh)