From 37199da754a2024ebdf5b36bb704b4ff7a42824d Mon Sep 17 00:00:00 2001 From: Omar Santos Date: Sat, 20 Jan 2018 00:14:08 -0500 Subject: [PATCH] adding recon info --- recon/README.md | 45 +++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 45 insertions(+) create mode 100644 recon/README.md diff --git a/recon/README.md b/recon/README.md new file mode 100644 index 0000000..0a776e1 --- /dev/null +++ b/recon/README.md @@ -0,0 +1,45 @@ +# Active and Passive Reconnaissance Tips and Tools + +## Passive Recon + +### Website Exploration and "Google Hacking" +* censys - https://censys.io/ +* netcraft - https://searchdns.netcraft.com/ +* Google Hacking Database (GHDB) - https://www.exploit-db.com/google-hacking-database/ +* ExifTool - https://www.sno.phy.queensu.ca/~phil/exiftool/ +* Certficate Search - https://crt.sh/ +* Google Transparency Report - https://transparencyreport.google.com/https/certificates +* SiteDigger - http://www.mcafee.com/us/downloads/free-tools/sitedigger.aspx +* FOCA - http://www.informatica64.com/DownloadFOCA + +### Social Media +* A tool to scrape LinkedIn: https://github.com/dchrastil/TTSL +* cree.py http://ilektrojohn.github.com/creepy/ + +### Whois +WHOIS information is based upon a tree hierarchy. ICANN (IANA) is the authoritative registry for all of the TLDs and is a great starting point for all manual WHOIS queries. +* ICANN - http://www.icann.org +* IANA - http://www.iana.com +* NRO - http://www.nro.net +* AFRINIC - http://www.afrinic.net +* APNIC - http://www.apnic.net +* ARIN - http://ws.arin.net +* LACNIC - http://www.lacnic.net +* RIPE - http://www.ripe.net + +## BGP looking glasses +* BGP4 - http://www.bgp4.as/looking-glasses +* BPG6 - http://lg.he.net/ + +## DNS +* dnsenum - http://code.google.com/p/dnsenum +* dnsmap - http://code.google.com/p/dnsmap +* dnsrecon - http://www.darkoperator.com/tools-and-scripts +* dnstracer - http://www.mavetju.org/unix/dnstracer.php +* dnswalk - http://sourceforge.net/projects/dnswalk + +### Other Great Intelligence Gathering Sources and Tools +* Resources from Pentest-standard.org - http://www.pentest-standard.org/index.php/PTES_Technical_Guidelines#Intelligence_Gathering + +## Active Recon +* Tons of references to scanners and vulnerability management software for active reconnaissance - http://www.pentest-standard.org/index.php/PTES_Technical_Guidelines#Vulnerability_Analysis