Reporting/Data Consonlidation software:
https://dradisframework.com/ce/
OSINT
Retrieve DUNS and CAGE/NCAGE numbers for businesses:
Search companies filings:
Finding Job Postings:
Companies, people, investors, and financial information:
Harvesting
Google dork for files = site:website.com filetype:pdf
Windows tool to browse, download, and extract metadata from files automatically:
theHarvester:
Cached and Archived Sites
Nmap
Ping Sweep:
nmap -sn <range>
fping -A -g <range> 2>/dev/null
DNS Discovery
DNS Resource Records:
SOA (Start of authority)
NS (Name Server)
A (Address)
PTR (Pointer)
CNAME
MX (Mail Exchange)
nmap -sS -sU -p 53 -n <range>
After Identifying port 53 open:
nslookup server <IdentifiedDNSserver> set q=NS (or other records like MX) <known_domain_name>
nslookup
server <IdentifiedDNSserver>
set q=NS (or other records like MX)
<known_domain_name>
and then
nslookup server <IdentifiedDNSserver> <newly_discovered_domain_name>
nslookup
server <IdentifiedDNSserver>
<newly_discovered_domain_name>
Dig:
dig @<DNSserverIP> <Known_Domain_Name> -t AXFR +nocookie
dig <domain>
dig <domain> PTR
dig <domain> MX
dog <domain> NS
dig axfr <@domain> <domain>
Mail Exchange:
nslookup -type=MX <domain>
Name Servers:
nslookup -type=NS <domain>
Enumerating IP addresses
Bing filter 'ip':
also try:
Methods to perform ICMP ping sweeps:
fping
fping -A -g <range> 2>/dev/null
fping -A <ip> -r 0
= No retries. Sends single icmp packet
fping -A <ip> -e
= Return time it took to send packet
fping -q -a -g <range> -r 0 -e
= Quiet output; Scan range; No retires; display duration of scan
nmap
nmap -sn <range>
--disable-arp-ping
hping
hping3 -1 <ip> -c 3
= Send 3 ICMP requests
hping3 --icmp-ts <ip> -c 3 -V
= Send 3 timestamped ICMP requests
hping3 -2 <ip> -c 3 -V
= Sends 3 UDP packets to target IP. Will scan port 0 by default. Port unreachable is OK; any response is good.
hping3 -S <ip> -c 3
= Sends 3 TCP SYN packets
hping3 -S <ip> -c 3 -p 80
= Sends 3 TCP SYN packets to port 80
hping3 -F
= FIN packets
hping3 -U
= Urgent packets
hping3 -X
= Xmas scan
hping3 -Y
= Ymas scan
hping3 -1 <192.168.1.x> --range-dest -I eth0
= Ping sweep range
DNS Enumeration
nmap -sS -p53 <range>
nmap -sU -p53 <range>
Google: whois dns lookup namecheap
whois -h <whois server>
nslookup <domain>
nslookup -query=mx <domain>
- Identify Mail Servers
nslookup -query=ns <domain>
- Identify Nameserver
dig <domain name>
dig +nocmd <domain name> MX/NS/A +noall +answer
= Query mail servers, namerservers or retreieve IP using Dig.
Zone Transfer
dig +nocmd <domain name> AXFR +noall +answer @<domain name>
Perl Script:
dnsenum <domain name>
DNS Map (subdomain brute forcer):
dnsmap <domain name>
= Brute force subdomains and return IPs
dnsrecon:
dnsrecon <domain name>
DNSdumpster: Nonintrusive dns enumeration tool
dnsmap
dnsenum
FOCA (Fingerprinting Organizations with Collected Archives)
Shodan