Information Gathering (Host Discovery/DNS Enumeration)

Reporting/Data Consonlidation software:
https://dradisframework.com/ce/

OSINT

Retrieve DUNS and CAGE/NCAGE numbers for businesses:

Search companies filings:

Finding Job Postings:

Companies, people, investors, and financial information:

Harvesting
Google dork for files = site:website.com filetype:pdf

Windows tool to browse, download, and extract metadata from files automatically:

theHarvester:

Cached and Archived Sites


Nmap
Ping Sweep:


DNS Discovery

DNS Resource Records:

After Identifying port 53 open:

nslookup
server <IdentifiedDNSserver>
set q=NS (or other records like MX)
<known_domain_name>
nslookup
server <IdentifiedDNSserver>
set q=NS (or other records like MX)
<known_domain_name>

and then

nslookup
server <IdentifiedDNSserver>
<newly_discovered_domain_name>
nslookup
server <IdentifiedDNSserver>
<newly_discovered_domain_name>

Dig:

Mail Exchange:

Name Servers:


Enumerating IP addresses

Bing filter 'ip':

also try:


Methods to perform ICMP ping sweeps:

fping
fping -A -g <range> 2>/dev/null

fping -A <ip> -r 0 = No retries. Sends single icmp packet
fping -A <ip> -e = Return time it took to send packet
fping -q -a -g <range> -r 0 -e = Quiet output; Scan range; No retires; display duration of scan

nmap
nmap -sn <range>

hping

hping3 -1 <ip> -c 3 = Send 3 ICMP requests
hping3 --icmp-ts <ip> -c 3 -V = Send 3 timestamped ICMP requests
hping3 -2 <ip> -c 3 -V = Sends 3 UDP packets to target IP. Will scan port 0 by default. Port unreachable is OK; any response is good.
hping3 -S <ip> -c 3 = Sends 3 TCP SYN packets
hping3 -S <ip> -c 3 -p 80 = Sends 3 TCP SYN packets to port 80
hping3 -F = FIN packets
hping3 -U = Urgent packets
hping3 -X = Xmas scan
hping3 -Y = Ymas scan
hping3 -1 <192.168.1.x> --range-dest -I eth0 = Ping sweep range


DNS Enumeration

nmap -sS -p53 <range>
nmap -sU -p53 <range>

Google: whois dns lookup namecheap

whois -h <whois server>

nslookup <domain>
nslookup -query=mx <domain>- Identify Mail Servers
nslookup -query=ns <domain> - Identify Nameserver

dig <domain name>
dig +nocmd <domain name> MX/NS/A +noall +answer = Query mail servers, namerservers or retreieve IP using Dig.

Zone Transfer
dig +nocmd <domain name> AXFR +noall +answer @<domain name>

Perl Script:
dnsenum <domain name>

DNS Map (subdomain brute forcer):
dnsmap <domain name> = Brute force subdomains and return IPs

dnsrecon:
dnsrecon <domain name>


Tools

DNSdumpster: Nonintrusive dns enumeration tool

dnsmap
dnsenum

FOCA (Fingerprinting Organizations with Collected Archives)

Shodan