Assets discovery
https://book.hacktricks.xyz/generic-methodologies-and-resources/external-recon-methodology#asns other asn’s regions
$ echo AS394161 | asnmap -silent | naabu -silent
$ echo AS394161 | asnmap -silent | naabu -silent -nmap-cli 'nmap -sV'
amass intel -asn 46489
amass intel -d tesla.com -whois
dnsrecon -r <DNS Range> -n <IP_DNS> #DNS reverse of all of the addresses
dnsrecon -d facebook.com -r 157.240.221.35/24 #Using facebooks dns
dnsrecon -r 157.240.221.35/24 -n 1.1.1.1 #Using cloudflares dns
dnsrecon -r 157.240.221.35/24 -n 8.8.8.8 #Using google dns
Domains and SubDomains
Pesquise nas palavras das páginas da web que podem ser compartilhadas em diferentes sites da mesma organização. A sequência de direitos autorais pode ser um bom exemplo. Depois procure por essa string no google, em outros navegadores ou até mesmo no shodan.
cat my_targets.txt | xargs -I %% bash -c 'echo "http://%%/favicon.ico"' > targets.txt
python3 favihash.py -f https://target/favicon.ico -t targets.txt -s
shodan search org:"Target" http.favicon.hash:116323821 --fields ip_str,port --separator " " | awk '{print $1":"$2}'
subfinder -d DOMAIN -silent -all -o subfinder_output | httpx -silent -o httpx_output
subfinder -d domain.com -silent | httpx -status
subfinder -d domain | httpx -csp-probe -title
Github-subdomains.py é um script parte do repositório de enumeração Github chamado “github-search”. Ele consultará a API do Github em busca de subdomains https://github.com/gwen001/github-search/blob/master/github-subdomains.py
passive subdomain recon with shodan https://github.com/incogbyte/shosubgo
tomnomnom tool https://github.com/tomnomnom/assetfinder
theHarvester -d DOMAIN -b "anubis, baidu, bing, binaryedge, bingapi, bufferoverun, censys, certspotter, crtsh, dnsdumpster, duckduckgo, fullhunt, github-code, google, hackertarget, hunter, intelx, linkedin, linkedin_links, n45ht, omnisint, otx, pentesttools, projectdiscovery, qwant, rapiddns, rocketreach, securityTrails, spyse, sublist3r, threatcrowd, threatminer, trello, twitter, urlscan, virustotal, yahoo, zoomeye"
sub, cloud, js https://github.com/nsonaniya2010/SubDomainizer
ffuf -w subdomains-top1million-5000.txt -u http://10.10.10.208 -H 'Origin: http://FUZZ.crossfit.htb' -mr "Access-Control-Allow-Origin" -ignore-body
passive recon https://github.com/pirxthepilot/wtfis
passive recon with shodan https://github.com/Dheerajmadhukar/karma_v2
smap port scan (shodan api free) https://github.com/s0md3v/Smap
$ smap DOMAIN or IP
Recon in Cloud based infra
cloud ips:
Amazon: http://bit.ly/2vUSjED
Azure: http://bit.ly/2r7rHeR
Google Cloud: http://bit.ly/2HAsZFm
https://github.com/lord-alfred/ipranges/blob/main/all/ipv4_merged.txt (cloud providers ips)
http://kaeferjaeger.gay/ (cloud providers ips)
How To Scan AWS’s Entire IP Range to Recon SSL Certificates https://www.daehee.com/blog/scan-aws-ip-ssl-certificates
cert transparecy in cloud ips/domains https://github.com/g0ldencybersec/cloudrecon
$ grep -F '.DOMAIN.COM' domainfile_DB.txt | awk -F '[][]''{print $2}' | sed 's##\n#g' "DOMAIN.COM" | sort -fu | cut -d ',' -f1 | sort -u
$ grep -F '.DOMAIN.COM' domainfile_DB.txt | awk -F '[][]''{print $2}' | sed 's##\n#g' | sort -fu | cut -d ',' -f1 | sort -u
$ prips 173.0.84.0/24 | ./hakip2host
Github
$ echo domain.com | subfinder -silent | xargs -I@ sh -c 'goop @ -f'
https://gist.github.com/jhaddix/1fb7ab2409ab579178d2a79959909b33
After sub enum
[ ] Pré-Manual Testing and Automation
Content/Parameter/URL Discovery
[ ] Historical (echo domain.com | gau | wordlistgen | sort -u) |
Technologies Tips (web servers and frameworks)
$ arjun -u url
ffuf -u http://api.com.br/FUZZ -w /usr/share/seclists/Discovery/Web-Content/api/api-endpoints.txt -p 20 -t 1 -c -v -o ffuf_output
$ cat domains.txt | httpx -status | gau
$ cat domains.txt | httpx -status -ports 80,443,8080 -path /admin
$ subfinder -d domain.com -silent | aquatone
$ cat targets | ./feroxbuster --stdin --silent -s 200 301 302 --redirects -x js | fff -s 200 -o js-files
$ echo domain | waybackurls | unfurl paths
$ echo domain | waybackurls | unfurl keys
$ echo domains | waybackurls | gf xss | hakcheckurl
$ echo domains | subfinder -silent | httpx -silent | katana -silent -d 10 | unfurl keys | uro
[ ] Application Analysis
cat url_with_params | uro | gf xss
cat url_with_params | uro | gf xss | httpx -t 1 -rlm 4 | qsreplace '"><svg onload=confirm(1)' | airixss -c 1 -p "confirm(1)"
cat url_with_params | httpx -t 1 -rlm 4 | Gxss -c 1 -p GELEIA -v -o gxss_out
cat wayback_output | Gxss -c 100 -p GELEIA | dalfox pipe --skip-bav --silence