On Cyber War
TwitterGitHubLinkedIn
  • Welcome
  • Source Zero Con References
  • 1. Reconnaissance/ OSINT
    • Information gathering
    • OSINT tools
    • Search Engine OSINT
    • Sock puppets
  • 2. Scanning
    • Host discovery
    • Port Scanning with Nmap
    • Nmap Scripting Engine
  • 3. Enumeration
    • 21 - FTP
    • 22 - SSH
    • 25 - SMTP
    • 53 - DNS
    • 80/443 - HTTP(s)
    • 111 - NFS
    • 135 - RPC
    • 139/445 - NetBIOS/SMB
    • 161 (UDP) - SNMP
    • Wordpress
    • Finger (Solaris)
    • Active Directory
  • 4. Exploitation
    • Public exploits
    • Web application attacks
      • Command injection
      • Cross site scripting
      • Directory traversal
      • File inclusion
      • SQL injection
    • Password attacks
    • Buffer overflows
    • Active Directory
    • Metasploit
  • 5. Maintaining access
    • Upgrading simple shells
    • Reverse shells
    • MSFvenom
    • File transfers
    • Linux privilege escalation
    • Windows privilege escalation
    • Tunneling/Port Forwarding
  • 6. Miscellaneous
    • Connections
  • 7. Walkthroughs
    • HTB - Blunder
    • HTB - Haircut
    • THM -HackPark
Powered by GitBook
On this page
  • CeWL
  • FOCA
  • Hunter
  • Netcraft
  • OSINT framework
  • Phonebook.cz
  • Recon-ng
  • Shodan
  • Social media tools
  • TheHarvester
  • whois enumeration
  1. 1. Reconnaissance/ OSINT

OSINT tools

PreviousInformation gatheringNextSearch Engine OSINT

Last updated 2 years ago

CeWL

  • Ruby tool that spiders websites and generates wordlists for use in dictionary attacks.

  • (included in Kali)

cewl [options] <url>
Example: cewl -m 6 -w megacorp-cewl.txt www.megacorpone.com
-d = depth to spider, default 2
-m = minimum word length, default 3
-w = write the output to file, include file name
-c = count, show word count for each word entry
-v = verbose

FOCA

  • Metadata search tool that can search, download and analyze all documents on a domain and provide a list of metadata

  • Metadata often includes users, directories, printers, emails, passwords, operating systems/software and servers

Hunter

  • From the site: "Hunter lets you find professional email addresses in seconds and connect with the people that matter for your business."

Netcraft

  • Provides various functions including DNS information and technologies being used on a site.

OSINT framework

  • Massive directory of OSINT tools arranged by function

Phonebook.cz

  • Lists all domains, email addresses, and URLs associated with a domain.

Recon-ng

  • Module based framework for web information gathering

  • Run tool (Kali): recon-ng

  • Search available modules: marketplace search $keyword

  • Learn about available modules: marketplace info $modulename

  • Add a module: marketplace install module

  • Load module: modules load $modulename

    • Display required parameters: info

    • Configure options: options set $option

    • Execute module: run

  • Information from each module used is stored in a database

    • Exit module: back

    • Display information: show

Shodan

  • Allows searching for computers and IoT devices

  • May reveal items that should be in scope but were not included by the client

  • Search by client name; devices outside the client's IP range are likely managed by third parties

Social media tools

TheHarvester

  • Gathers emails, names, subdomains, IP addresses, and URLs from multiple search engines

  • Run with (Kali): Theharvester -d cisco.com -b google

    • -d: specifies the target domain

    • -b: specifies which data source to search

whois enumeration

  • Regular lookup: whois somesite.com

  • Reverse lookup: whois $ipaddress

- a search engine for social media sites

- scans a user's Twitter feed and generates wordlists

- a script for generating username lists based on LinkedIn data

https://github.com/digininja/CeWL
https://github.com/ElevenPaths/FOCA
https://hunter.io/
https://www.netcraft.com/tools/#internet-research
https://osintframework.com
https://phonebook.cz/
https://www.shodan.io/
Social-Searcher
Twofi
linkedin2username