Hacking Phase 1 - Reconnaissance Phase


SUBMITTED BY: DevilDawg

DATE: July 27, 2021, 9:21 p.m.

FORMAT: Text only

SIZE: 28.1 kB

HITS: 1830

  1. RECONNAISSANCE
  2. The Reconnaissance phase, aka Footprinting, is the most important phase. This is the phase where you gather all the information on your target. What can possibly make or break your success is in this stage. If you take the first idea that pops in your head and attack your target, you will most likely fail. In this phase you will need to spend months gathering data on your target to find a vulnerability and be successful. You will need to perfect this skill to be a ethical hacker.
  3. Active Reconnaissance - in this search you directly interact with the computer system to gain information. This type of information gathering will leave your digital footprint to be traced back to you. If at all possibly try and avoid this type of scanning.
  4. Passive Reconnaissance - this type of search you are not directly interacting with the target. This way you don't leave any foot prints that will lead back to you and get you in trouble.
  5. Organizations has a plethora of information available on the web, you just have to know how to search for it. This first trick I am going to discuss will be a passive attack and it does not work on every web browser. First go to google's main page, if your using another browser like duckduckgo, and in the search bar type in "football", your first link should be NFL. Look for the web address, www.nfl.com, now just to the right of the address will be a drop down arrow. Click the arrow and you will see the word "cached", click the word and now you can search the website passively without leaving any footprints. If you click any links on that cached page you will go to a live site and leave a footprint. The next passive attack I will discuss will be cloning a website. Kali and other apps will let you clone the website and then go offline to do research. This way you are not actively interacting with the website, you are scanning a copy of it and your offline. If you did not know about it google has web crawlers that scan every website, unless blocked by the robots.txt, and keeps a copy in archives. You can access these archives and research more on your target without leaving any traces.
  6. Google Cached Page - Google Cache is normally referred as the copies of the web pages cached by Google. Google crawls the web and takes snapshots of each page as a backup just in case the current page is not available. (https://cachedview.com/)
  7. Archive.org Cache - The Archive.org, also known as Wayback Machine, is a digital archive of the World Wide Web and other information on the Internet created by the Internet. The service enables users to see archived versions of web pages across time, which the Archive calls a three dimensional index.
  8. You can use either of these to research your target without getting in trouble. If you saw something listed on a website and the next day it is gone you can go to the archive and examine it further in depth. There are many ways to use this technique to your advantage.
  9. During the recon phase you will be gathering information on the company, employers and third party vendors. Here are some things you will need to search on your target.
  10. Information gathering about the target:
  11. Most important I.P. gathering
  12. Search public information, gather as much info without sending a single packet
  13. Physical address
  14. Phone Number
  15. Fax numbers
  16. Email Addresses
  17. Hours of Operation
  18. Business Relations: 3rd Party
  19. Employee Emails/Name
  20. Social Media Connections
  21. News and Announcements - Merges
  22. Job Postings
  23. Job openings (software, Hardware, Network related information)
  24. When researching a company I like to check the job postings first. The company will spill their guts out if you will just take the time to read. Lets examine this job posting:
  25. Responsibilities:
  26. Analyzing network errors or anomalies, as well as specific network performance issues and/or error messages, in order to ensure maximum uptime and service quality and assess trends that may ultimately result in degradation of service
  27. -- Analyze and configure VOIP network traffic to ensure high quality of service and high availability
  28. Formulating and implementing monitoring, policies, procedures and standards relating to network management
  29. -- Manage and work with 3rd party vendors to procure and maintain network devices, assist in cost analysis to ensure highest value to Sage Intacct
  30. Troubleshooting API and other system issues at a per-packet level via packet trace and sniffer analysis, including the troubleshooting of 3rd party data integration services and/or other Web-enabled solutions
  31. Participation in a 24x7 on-call rotation on a periodic basis; this requires functional knowledge of all Sage Intacct network devices, domain controllers, VPN and subsystems outside of the networking layer in order to provide on-call support
  32. Requirements:
  33. -- BS/BA degree, or equivalent work experience, CCNP certification preferred
  34. 5+ years direct experience required in the management and administration of network infrastructure - routers, switches, load balancers, SSL acceleration technology, etc.
  35. -- 5+ years experience with network protocols for routing and access, including but not limited to: BGP, IS-IS, OSPF, RIP, EIGRP, RADIUS, TACACS, STP, etc.
  36. In-depth knowledge of TCP/IP and BGP an absolute requirement
  37. -- Extensive working experience with Cisco ASA 5500 series, Dell N2000 and N3000 switches
  38. Experience with VPN remote access and PTP VPN tunnels
  39. Experience with multi-site routing, peering, and disaster recovery network architectures
  40. Experience with the use and implementation of enterprise monitoring and management frameworks and tools
  41. Experience working in structured change management processes for highly available datacenter networks
  42. -- Familiarity with WiFi standards and experience managing wireless network configurations, Cisco Meraki experience is a plus
  43. Firewall/security experience (ACL, GRE/IPsec tunnels, FWSM, IDSM2, and secure remote access/management practices)
  44. -- Experience with Palo Alto Networks firewalls is a plus
  45. -- Familiar with one or more of the following monitoring tools: Zabbix, Nagios, PRTG or Cacti
  46. Education and Certification Requirements:
  47. Preferred – Bachelor’s degree (computer science, business administration or related field) or equivalent experience
  48. Preferred certifications
  49. Cisco CCNA or CCNP
  50. Palo Alto Networks PCNSE
  51. The second line under responsibilities I placed 2 tick marks by it, the company asks you to be knowledgeable with VOIP. The first thing that pops into my head is Wireshark. Wireshark captures packets as they go across the network and when the company uses VOIP it is turned into a packet and traverses the network. Wireshark will capture that packet and you can listen to the phone conversation.
  52. The next tick mark I made deals with 3rd party vendors. Always check for 3rd party vendors since they have access to the company you are researching. If I want to hack a company and their security is super tight, fort knox, I will attack the 3rd party vendors and then access the company.
  53. The next couple tick marks as you see the company asks for people knowledgeable with Cisco Networking gear. They also go in-depth about what equipment they are using, Cisco ASA 5500 series, Dell N2000 and N3000 switches, so they are telling you right there what they are using.
  54. The 6th tick states familiarity with WIFI and Cisco Meraki is a plus. This tells me I could possibly gain access to their network threw WIFI, and they are using the cloud so I should research the clouds weakness.
  55. The next tick states experience with Palo Alto, which is a used to prevent cyber attacks.
  56. The last tick tells me all the network monitoring tools they use. How nice of them to give me all this information. Now I research each of these ticks in-depth and find weaknesses. Take for example, Nagios monitoring system, go to your web browser and type in "Nagios vulnerabilties", there is 247,000 results. I am sure we can find some good information if we dig deep enough. Right off the bat they talk of Cross Site Scripting(XSS), SQL Injection, Remote Code Execution(RCE) and Privilege Escalation. We will discuss these topics more in-depth at a later time, but just wanted to show you how much information is on the web.
  57. Physical addresses - come in handy when you want to go dumpster diving or digging in the trash. Trash is free game, you can go threw it and the owners can not say a thing, but if they have a fence around their dumpster or their business then you are trespassing. Kevin Mitnick said he went threw AT&T's dumpster and found a bag full of shredded paper. His team took the bag to Starbucks, grabbed some coffee and dug into the bag. After they pieced everything back together, they had each employers name, email and password. Word to the wise, BURN your important documents. You can find a lot of information in dumpsters that can come in handy later on, which ill discuss more on Dumpster Diving later on.
  58. Email addresses - Most companies follow a pattern when dealing with email accounts. Each company can be different so during your research grab a couple different email addresses to study. The thing you are looking for is the format the company uses, Jon Smith@XXXXX or JSmith@XXXXX or is it SmithJ@XXXXX after you figure the pattern out then start a brute force attack on the email account, ill discuss other ways using social engineering later on.
  59. Hours of operation - lets make sure when we start our exploiting stage that workers are not still at work.
  60. Business Relations - find all the 3rd party vendors
  61. Social Media - Check facebook, linkedin, and other social media for information on your target. Check the employers facebook page for information. They might talk about issues at their job or even seen a posting where the I.T. guy said "Have to pull an all nighter, our firewall went down". Thanks for the tip my man.
  62. New and Announcements - Watch for upcoming events that you could attend to gather more information, especially watch for "MERGES", when companies merge they are vulnerable. The network might have issues, company equipment might fail the possibilities are endless. Look how corona has changed so much, "As the Coronavirus pandemic continues to force people to work from home, countless companies are now holding daily meetings using videoconferencing services from Zoom".....ZOOM ? Zoom vulnerabilities ? researcher Mazin Ahmed, who presented his findings at DEF CON 2020, the company also left a misconfigured development instance exposed that wasn't updated since September 2019, indicating the server could be susceptible to flaws that were left unpatched. After Ahmed privately reported the issues to Zoom in April and subsequently in July, the company issued a fix on August 3 (version 5.2.4). Wait did you catch it? read it again...... He told Zoom they was vulnerable to an attack in April and they did not patch the issue till August....so for 4 months Zoom was open game. There are groups you can join, might be for a fee, that receives these issues and usually it takes around a year for the patch to come out. So that says you could find out the companies vulnerabilities and have about a year before they issue a patch.
  63. Some places to do your researching at:
  64. News and Groups
  65. Bulletin Board Systems
  66. Facebook
  67. Instagram
  68. Twitter
  69. LinkedIn
  70. Bing
  71. Dogpile
  72. Google
  73. Yahoo
  74. Webferret - https://download.cnet.com/WebFerret/3000-2379_4-10002998.html
  75. EDGAR - Publicly traded companies ( https://www.sec.gov/edgar.shtml )
  76. groups.google.com
  77. Best People Search:
  78. SwitchBoard ( https://inter800.com/switchboard/ )
  79. GooleFinance ( https://www.google.com/finance )
  80. YahooFinance ( https://finance.yahoo.com/ )
  81. blackbookonline.info ( https://www.blackbookonline.info/ )
  82. Reunion.com
  83. Classmates.com ( https://www.classmates.com/ )
  84. Plaxo.com ( https://en.wikipedia.org/wiki/Plaxo )
  85. Zaba Search ( https://www.zabasearch.com/ )
  86. Spokeo ( https://www.spokeo.com/ )
  87. pipl.com
  88. familytreenow.com
  89. thatsthem.com
  90. luller.com
  91. WARDIALING:
  92. phonenumber.com
  93. 411.com
  94. yellowpages.com
  95. Wardialing - is a technique to automatically scan a list of telephone numbers, usually dialing every number in a local area code to search for modems, computers, bulletin board systems (computer servers) and fax machines. There are to many ways to list all the possibilities with this technique. The major one I will talk about is Fax Machines, this is the place you should attack and hard. Fax machines are sometimes still hooked up to dial up if your old enough to even know what that is. Fax machines has weak securities and in big companies they have employees email addresses and passwords stored. Around 10 years ago I think it was, the terrorists was buying all of the militaries copying machines, come to find out even after erasing the memory you could still pull up all the information the military was scanning, that included social security numbers, addresses and more. Anyone need a Fake Passport, CC, or ID ?
  96. Another thing to research is for an offsite storage building. Major companies store their backup data at another location incase a fire breaks out or a major catastrophe happens. This way the backups will not be damaged and the company can be back up and running in minimal time. The term you might hear or search for is Hot, Warm and Cold Sites. Hot site means it is up and running, Warm site means it can be up in a short time, and Cold site will take awhile for it to get running. These buildings are where the companies store there backup data and usually is not guarded making it a easy target to get information from.
  97. Google Earth to see target:
  98. Google Street car drives around the country recording data, WIFI, MAC addresses ( https://www.google.com/streetview/ )
  99. API at shodanhq.com/research/geomac ----Blackhat 2010 Sammy Kramkars " How I met your girlfriend" ( https://www.wired.com/2015/12/the-greatest-hits-of-samy-kamkar-youtubes-favorite-hacker/ )
  100. This is a older technique, but sometimes still works, Extract DNS - Zone transfers. DNS servers are an excellent target for hackers and penetration testers to gather data from, the information is considered highly valuable to attackers. This contains a full listing of internal IP addresses that belong to our target. We will dig deeper later on.
  101. Go to the companies cloned site, right click the main page and click "view source" and "inspect element". Sometimes people that code the website leaves notes to themselves so they wont forget, but then forgets to remove the notes. Some admins might leave passwords in there or issues they was working on. Every little bit of information will help.
  102. Search for VPN's to connect to companies or individuals
  103. Search for:
  104. Company Resume firewall
  105. Google Resume firewall
  106. So I searched for Chevron Resume Firewall, and it showed me a Resume of a person that worked at Chevron or was applying for a job at Chevron. Study his qualifications, this might tell you more information about what equipment they have at the targets company.
  107. Send a email with a empty .bat file. Once rejected break down the rejection for vendor, version of anti-virus, inspect the header for IP, software brand of email server running
  108. Offline Browser - Teleport Pro - https://en.freedownloadmanager.org/Windows-PC/Teleport-Pro.html
  109. Multiple Search Engines: All-in-one ( https://all-io.net/ ), Dogpile ( https://www.dogpile.com/ ), groups.google.com
  110. Advanced Search in websites - AltaVista ( http://ca-en.altavista.com/ )
  111. Sites to research recent cyber attacks:
  112. https://www.malware.us-cert.gov/MalwareSubmission/pages/submission.jsf
  113. https://www.usa.gov/federal-agencies/computer-emergency-readiness-team
  114. https://nvd.nist.gov/
  115. https://www.securitytracker.com/
  116. https://securiteam.com/
  117. http://www.hackerwatch.org/
  118. https://www.securityfocus.com/
  119. https://www.scmagazine.com/
  120. https://www.w4rri0r.com/vulnerabilities-attacker-surface.html
  121. https://www.wired.com/2015/12/the-greatest-hits-of-samy-kamkar-youtubes-favorite-hacker/
  122. https://owasp.org/www-project-top-ten/
  123. https://www.veracode.com/security/owasp-top-10
  124. Learn how hackers are attacking companies so you can be up to date and learn how to defend it.
  125. I am briefly going to talk about Google-Fu or Google Hacking. Looking up information can take a lot of time and when you hit that enter button on whatever you are researching and it says 565,000 results can be discouraging. So how you list your topics of search in the google search bar determines the result factor. There are ways to cut the results down to a fraction and save yourself a lot of time going threw all the threads.
  126. I chose to research Emmitt Smith:
  127. emmitt smith - About 2,790,000 results
  128. black male/emmitt smith - About 1,390,000 results
  129. Dallas Cowboys/emmitt smith - About 1,130,000 results
  130. So the more information I added google honed in more and I had less results to parse threw. You can narrow it down even further with the right knowledge. Here are some ways to better your research and lower your results.
  131. intitle or allintitle:
  132. intitle - search word is within the title.
  133. allintitle - only return websites that contain all the keywords in the webpage title. Example allintitle:index of *****
  134. URL - inurl:admin - reveals admin or configuraton on targets website
  135. Filetype:PDF
  136. Combine them - site:dsu.edu filetype:PDF
  137. Term Action
  138. filetype: Search for a file by its extension (e.g. PDF)
  139. cache: View Google's Cached version of a specified URL
  140. intitle: The specified phrase MUST appear in the title of the page
  141. Johnny Long has a great book out called "Google Hacking for Penetration Testing" (download for free at pdfdrive.com) or watch the presentation Johnny Long gave at Defcon 13 ( https://www.youtube.com/watch?v=fo1BR9itwOY )
  142. Start researching more indepth on each of these topics and take notes in a composition notebook, they run around a dollar each. I have a notebook for each phase and write everything that I find of value inside them. This way when I engage a target, I pull my notebooks out, run down the lists, fill in the blanks and this makes it so much easier because as we get older and learn more things we forget older things.
  143. Start practicing on overthewire.org, start off with Bandit and complete the 34 stages and then move to the next playground, I think there are 17 playgrounds on overthewire to learn from.
  144. Capture the Flag (CTF) competitions can be rewarding, soul destroying and intimidating all at the same time. I’d strongly recommend getting stuck in and signing up to CTFs as soon as possible. Don’t wait until you’ve mastered a specific skill as CTFs are a brilliant learning resource first and foremost. Set aside time every week to get onto a CTF and treat this time as sacred. Don’t let anything distract you away from this time slot if you can help it!
  145. Consider joining a CTF team to enhance your pool of learning resources. There are always teams looking for new members. The “OpenToAll” team is one that comes to mind, who are now at an astounding 300+ team members.
  146. Here are some tools to research that you will use during the Reconnaissance Phase:
  147. HTTrack - Makes a offline copy of the website
  148. Blackwidow Pro or Wget can extract complete copy of website
  149. The Harvester
  150. Whois.net
  151. Netcraft
  152. Host
  153. NSLookup
  154. Dig
  155. MetaGoofil
  156. SEAT
  157. Maltego
  158. SamSpade
  159. NetScan
  160. GTWhois
  161. XWhois
  162. Archive.org
  163. Trellian
  164. Web Investigator
  165. MyReputation
  166. BiDiBLAH
  167. Big Brother
  168. Advance Administrative Tools
  169. Wikto
  170. ActiveWHois
  171. Spiderfoot
  172. Msr Strider URL Tracer
  173. WTR -Web the Ripper 2
  174. Dirbuster
  175. Wget - Linux/UNix
  176. Teleport Pro - Windows
  177. Athen 2.0
  178. SiteDigger
  179. Traceroute
  180. Search engines for Hackers:
  181. censys.io
  182. shodan.io
  183. viz.greynoise.io
  184. zoomeye.org
  185. netograph.io
  186. wigle.net
  187. intelx.io
  188. fofa.so
  189. hunter.io
  190. haveibeenpwned.com
  191. As we go along we will add more to this phase and discuss the topics more. So do some research, dig into these topics and if you have any questions ask one of us.
  192. Updated 11/24/2020
  193. Username search tools #OSINT
  194. https://t.co/hzHoHiDbFB
  195. https://t.co/6vE7pCI5Q8
  196. https://t.co/0gOGizBPIG
  197. https://t.co/XeS26gkzzu
  198. https://t.co/wMW7nFZCNa
  199. https://t.co/GbmYe47gtO
  200. https://t.co/fEAARCFsAU?
  201. https://t.co/heIvHUWeuQ
  202. https://t.co/mRerIKvDht
  203. https://t.co/qYO1k6TOWx
  204. https://t.co/p4eVgqZixX
  205. https://yandex.com/
  206. http://www.mavetju.org/unix/dnstracer-man.php
  207. https://www.maltego.com/?utm_source=paterva.com&utm_medium=referral&utm_campaign=301
  208. https://null-byte.wonderhowto.com/how-to/use-spiderfoot-for-osint-gathering-0180063/
  209. https://www.spiderfoot.net/
  210. https://hakin9.org/buster-an-advanced-tool-for-email-reconnaissance/
  211. https://hakin9.org/people-tracker-on-the-internet-osint-analysis-and-research-tool/
  212. https://www.entireweb.com/
  213. https://www.lycos.com/
  214. https://www.teoma.com/
  215. https://millionshort.com/
  216. https://www.offensiveosint.io/offensive-osint-s01e01-osint-rdp/
  217. https://www.martinvigo.com/email2phonenumber/
  218. https://www.secjuice.com/artificial-intelligence-ai-and-osint/
  219. https://phonexicum.github.io/infosec/osint.html
  220. https://www.reversephonecheck.com/
  221. https://www.kitploit.com/2020/06/sifter-74-osint-recon-vulnerability.html
  222. https://www.tracelabs.org/initiatives/osint-vm
  223. https://osint.link/
  224. https://www.bellingcat.com/resources/how-tos/2019/12/26/guide-to-using-reverse-image-search-for-investigations/
  225. http://www.faganfinder.com/filetype/
  226. https://www.yippy.com/
  227. https://github.com/jivoi/awesome-osint (EVERYTHING)
  228. https://github.com/Z4nzu/hackingtool (EVERYTHING)
  229. https://github.com/infosecn1nja/Red-Teaming-Toolkit (A TOOL FOR EVERY PHASE)
  230. https://osintframework.com/ (CLICK THE BLUE DOTS)
  231. https://github.com/PaulSec/API-dnsdumpster.com
  232. https://github.com/JoeWrieden/AutomatedOSINT
  233. https://github.com/0xApt/awesome-bbht A bash script that will automatically install a list of bug hunting tools that I find interesting for recon, exploitation, etc. (minus burp) For Ubuntu/Debain.
  234. https://github.com/jakejarvis/awesome-shodan-queries
  235. https://github.com/Cignoraptor-ita/cignotrack
  236. https://github.com/m0rtem/CloudFail
  237. https://github.com/OWASP/D4N155
  238. https://github.com/darkoperator/dnsrecon
  239. https://github.com/ex0dus-0x/doxbox
  240. https://github.com/sandialabs/dr_robot
  241. https://github.com/ChrisTruncer/EyeWitness
  242. https://github.com/thewhiteh4t/FinalRecon
  243. https://github.com/ElevenPaths/FOCA
  244. https://github.com/obheda12/GitDorker
  245. https://github.com/Sachaaaaaa/Grhoth
  246. https://github.com/khast3x/h8mail
  247. https://github.com/m4ll0k/Infoga
  248. https://www.osintcombine.com/instagram-explorer
  249. https://github.com/instant-username-search/instant-username-search
  250. https://github.com/ChrisTruncer/Just-Metadata
  251. https://github.com/pielco11/JungleScam
  252. https://github.com/initstring/linkedin2username
  253. https://github.com/laramies/metagoofil
  254. https://github.com/MISP/MISP-maltego
  255. https://github.com/ninoseki/mitaka
  256. https://github.com/AzizKpln/Moriarty-Project/
  257. https://github.com/HA71/Namechk
  258. https://github.com/th3unkn0n/osi.ig
  259. https://github.com/milo2012/osintstalker
  260. https://github.com/sundowndev/PhoneInfoga https://www.youtube.com/watch?v=WW6myutKBYk https://copycookie.com/phoneinfoga-advanced-information-gathering-osint-framework-for-phone-numbers/
  261. https://github.com/s0md3v/Photon
  262. https://github.com/nethunteros/punter
  263. https://github.com/m8r0wn/pymeta
  264. https://github.com/dchrastil/ScrapedIn
  265. https://github.com/thewhiteh4t/seeker
  266. https://github.com/HA71/sherlock
  267. https://github.com/kpcyrd/sn0int
  268. https://github.com/SpiderLabs/social_mapper
  269. https://github.com/laramies/theHarvester
  270. https://github.com/krmaxwell/tinfoleak
  271. https://github.com/jofpin/trape
  272. https://github.com/Ekultek/WhatBreach
  273. https://github.com/inurlx/XSPID3R
  274. Photo location search #map #geo #OSINT #SEO #infosec
  275. http://oldto.sidewalklabs.com/
  276. http://locationscout.net/
  277. http://shothotspot.com/
  278. http://whatwasthere.com/
  279. http://hotogrammar.yale.edu/
  280. io search engines #osint #seo #infosec #search
  281. http://darksearch.io/ dark web
  282. http://scinapse.io/ academic
  283. http://fnd.io/ itunes & app store
  284. http://redditsearch.io/ reddit
  285. http://filefactory.filesearch.io/ files
  286. http://keywordtool.io/ keywords
  287. https://inteltechniques.com/JE/
  288. https://technisette.com/p/tutorials
  289. https://i-sight.com/resources/101-osint-resources-for-investigators/
  290. http://browsershots.org/
  291. https://www.uk-osint.net/
  292. OSINT YouTube Videos
  293. https://www.youtube.com/watch?v=WW6myutKBYk Using phone numbers to gather info
  294. https://www.youtube.com/watch?v=SMxya-M6KhU Different tools
  295. https://www.youtube.com/watch?v=SvL9bpsY-ZQ Finding info in various ways
  296. https://www.youtube.com/watch?v=DSEGmdzs9Kg DefCon OSINT
  297. https://www.youtube.com/watch?v=RwwpXALAp3I Spiderfoot
  298. https://www.youtube.com/watch?v=d-Ql_WSwF0A MALTEGO
  299. https://www.youtube.com/watch?v=yrOOdq25wMw Sans
  300. Search Tips:
  301. Surround literals with " ", as in "Soc Sec Num"
  302. Add minus (-) to a search term to maximize effectiveness of resulting hits
  303. - Excludes pages with a given word
  304. Search for airline status
  305. - Type in airline and flight number
  306. - Front end for Travelocity
  307. Search for VIN for vehicle information
  308. Search for UPC number for product info
  309. By dumping records from your DNS servers, attackers can determine which machines are accessible on Internet.
  310. Using nslookup, information can be gathered
  311. Type
  312. C:\> nslookup
  313. >server [DNSServer]
  314. >set type=any
  315. >ls -d [domain]
  316. site:sans.org
  317. then:
  318. -www after you look at the results
  319. -isc review the results
  320. -ics review the results
  321. -labs review the results and keep taking away results you dont care to see
  322. "cache:www.counterhack.net"
  323. .bak is backup files that exposes passwords. site:www.[target].com bak
  324. Usa Foca to download all the files you can find on a target. Take a excel document and put a macro in it, email it to the person that created the document and title it "Fix Immediately" , they will open it and fix it not realizing they just clicked a virus, worm, or keylogger.
  325. use index of XXXXXXX to go str8 to their directory and search their files and folders. (site:wafflehouse.com intitle:index.of). Work more on this............................
  326. you can also find remote desktop systems: ext rdp
  327. indexable directories: intitle:index.of"parent directory"
  328. search for ID's and passwords
  329. Video Cameras.... search for inurl:"ViewerFrame?Mode="
  330. pastebin.com go on there and search for userid and passwords, password ngc.com is northrup gruman password list.
  331. shodan will give you the amount of IOT and their IP address
  332. images.shodan.io will give you the images of Remote Desktop Systems that are open to the internet... then in the search bar.....port:5900 will show VNC open to the internet with no paswords needed
  333. shodanhq.com
  334. dnsstuff.com
  335. tracert.com
  336. traceroute.org
  337. network-tools.com
  338. securityspace.com
  339. https://github.com/domssilva/vulnsearch A deep look at some recon methodologies and web-application vulnerabilities of my interest where I will merge all my notes gathered from books, videos, articles and own experience with bug bounty hunting / web and network hacking
  340. https://tools.tldr.run/ bunch of different tools
  341. https://intelx.io/ search database
  342. https://github.com/Err0r-ICA/TORhunter Designed to scan and exploit vulnerabilities within Tor hidden services. TORhunter allows most tools to work as normal while resolving .onion
  343. https://hunter.io/ find email and addresses fast
  344. https://rocketreach.co/login

comments powered by Disqus