method_2_recon
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
method_2_recon [2022/11/26 16:36] – [[1] OSInt] gman | method_2_recon [2022/12/31 22:10] (current) – [SMTP] gman | ||
---|---|---|---|
Line 46: | Line 46: | ||
====== [1] OSInt ====== | ====== [1] OSInt ====== | ||
- | **WhoIs:** '' | + | ===== WhoIs ===== |
- | **NSLookUp:** '' | + | '' |
+ | |||
+ | **Problem:** A major problem with whois lookups today is that the amount of visible data has been greatly reduced in an effort to provide better privacy and protection. | ||
+ | |||
+ | **Work-Around: | ||
+ | * DomainHistory.net (but it appears dead) | ||
+ | * WhoIsMind.com (but it appears out of service) | ||
+ | * What the heck...? | ||
+ | |||
+ | ===== NSLookUp ===== | ||
+ | |||
+ | '' | ||
< | < | ||
- | # Basic: | + | # Basic: |
+ | whois google.com | ||
nslookup google.com | nslookup google.com | ||
# Reverse: | # Reverse: | ||
+ | whois 172.250.191.174 | ||
nslookup 172.250.191.174 | nslookup 172.250.191.174 | ||
</ | </ | ||
+ | ===== FOCA ===== | ||
+ | |||
+ | **FOCA: Fingerprinting Organizations with Collected Archives** | ||
+ | * [[https:// | ||
+ | * You first need to install the Express version of MicroSoft' | ||
+ | * Download and unzip the [[https:// | ||
+ | * Run FOCA.exe | ||
+ | * When FOCA opens up, click on " | ||
+ | * In the next window click on settings | ||
+ | * Deselect all but FOCA in the Module filter | ||
+ | * Check (select) all options in the Search engines and Extensions option lists. | ||
+ | * Click on " | ||
+ | * Once it's finished, you need to " | ||
+ | * Then, highlight all the files, right click, and choose " | ||
+ | * This will dump all the metadata into Metadata Summary and Document Analysis | ||
+ | * Have fun! | ||
+ | |||
+ | ===== Routing Info ===== | ||
+ | Routing information is network information, | ||
+ | * You can find a list of them here: [[https:// | ||
---- | ---- | ||
Line 187: | Line 220: | ||
[[https:// | [[https:// | ||
* For Google tips, tricks, & how Google works... | * For Google tips, tricks, & how Google works... | ||
+ | |||
+ | Four of the most useful Google queries: | ||
+ | - **inurl: | ||
+ | * Example: '' | ||
+ | - **intitle: | ||
+ | * Example: '' | ||
+ | - **site[site | domain]:** Restrics results to the site or domain specified. | ||
+ | * Example: '' | ||
+ | * Example: '' | ||
+ | - **filetype: | ||
+ | * Example: '' | ||
---- | ---- | ||
Line 192: | Line 236: | ||
====== [3] Active Recon ====== | ====== [3] Active Recon ====== | ||
- | [place holder] | + | Much of active recon involves scanning. So... for right now, see "[[method_3_scanning | Scanning]]." |
+ | |||
+ | ===== URL Enum ===== | ||
+ | |||
+ | URL enumeration makes a list of URLs in a domain, often showing hidden files and directories. | ||
+ | * This is especially important in web application pentesting. | ||
+ | * NOTE: This is an aggressive process. | ||
+ | * Tool: [[https:// | ||
+ | |||
+ | ===== DNS Enum ===== | ||
+ | |||
+ | DNS enumeration is like an aggressive DNS lookup (think whois on steroids). | ||
+ | * This is active recon and it will take a long time. | ||
+ | * It barfs out a butt-ton of information. | ||
+ | * Tool: [[https:// | ||
+ | |||
+ | Example syntax: '' | ||
+ | |||
+ | ===== SMTP ===== | ||
+ | |||
+ | **Simple Mail Transfer Protocol (SMTP):** A vintage email sending protocol. | ||
+ | * No much built in security. | ||
+ | * Runs on port 25. | ||
+ | |||
+ | You can gather info on SMTP by telnetting to the service port (25) and grabbing the banner information and then using [[https:// | ||
+ | |||
+ | < | ||
+ | telnet example.server.com 25 | ||
+ | |||
+ | # once connected, type: | ||
+ | VRFY [username] | ||
+ | # or | ||
+ | EXPN [user_alias] | ||
+ | </ | ||
+ | |||
+ | **Exploits: | ||
+ | * Connect (by telnet). Grab banner info (VRFY, EXPN). | ||
+ | * This should give you a clue as to the SMTP version on your target. | ||
+ | ===== SNMP ===== | ||
+ | |||
+ | You can use SNMP to gather information on a system //**if**// you have access to the system //**and**// you know the " | ||
+ | |||
+ | **Tools: | ||
+ | - [[https:// | ||
+ | - [[http:// | ||
+ | |||
+ | < | ||
+ | # Example syntax for snmpwalk, assuming ' | ||
+ | snmpwalk -c public -v1 192.168.1.1 | ||
+ | </ | ||
---- | ---- |
method_2_recon.1669480577.txt.gz · Last modified: by gman