Passive recon
Passive recon
Passive reconnaissance is essential in the early stages of bug bounty
hunting. This approach allows you to gather information without direct
interaction with the target's systems, reducing the likelihood of
detection and helping build a detailed picture of the target’s digital
footprint. Below is a structured approach for conducting passive recon
effectively.
●
Wappalyzer
: A browser extension to identify frameworks,
CMSs,
JavaScript libraries, and server software.
●
BuiltWith
: An online tool for analyzing the technology
stack,
including CMS, eCommerce platform, JavaScript libraries, and
more.
●
Netcraft
: Provides hosting details, server software,
SSL
certificate information, and other insights into the technology
used.
WafW00f
: A specialized tool to detect the presence
of a Web
Application Firewall (WAF). This is useful for understanding the
target’s defensive layers and may indicate specific technologies.
bash
Copy code
wafw00f -a [target-domain]
●
Example:
plaintext
Copy code
https://builtwith.com/[target-domain]
●
Hunter.io
: Enter the domain name to gather a list
of publicly
available email addresses and associated personnel. Target
specific roles, such as “Security,” “IT,” or “Admin” for
higher-value contacts.
●
Email Permutator
: Use permutations to create potential
email
addresses based on known employee names, which can then be
validated in other tools.
Example:
plaintext
Copy code
https://hunter.io
Example:
plaintext
Copy code
https://netcraft.com
●
Breached Parse
: Aggregates information from known
data breaches
to identify leaked usernames and passwords related to the target.
●
Have I Been Pwned?
: Checks if the domain has any compromised
accounts, making it a quick way to verify if company emails were
part of known breaches.
Note
: Use breached credential information responsibly
and
only for authorized activities.
Example:
plaintext
Copy code
https://breachedparse.com
●
Sublist3r
: A Python-based tool that enumerates subdomains
from sources
like Google, Yahoo, Bing, and others.
bash
Copy code
python sublist3r.py -d [target-domain]
●
This step often reveals non-public areas and sensitive data that may
lead to valuable reconnaissance.
DNSRecon
: A tool that enumerates DNS records (A, AAAA,
MX, etc.) and
provides valuable insights.
bash
Copy code
dnsrecon -d [target-domain]
●
nslookup
: A basic command-line tool for resolving
DNS queries.
bash
Copy code
nslookup [target-domain]
●
●
Shodan search
for the target’s IP address or domain
name to
discover open ports, services, SSL certificates, and device
types.
●
Useful for finding vulnerable devices, IoT assets, and publicly
exposed web interfaces.
Example:
plaintext
Copy code
https://www.shodan.io/search?query=[target-domain]
Use
GitHub Dorking
to search for exposed data in public
repositories.
Example GitHub dorks:
plaintext
Copy code
[target-domain] filename:.env
[target-domain] filename:config OR filename:credentials
●
●
GitHub Advanced Search
allows filtering by organization,
filename, and other parameters.
Example:
plaintext
Copy code
https://github.com/search?q=[target-domain]
●
●
Combine keywords to locate sensitive directories or files, such
as backup files, admin panels, and credentials.
Example:
plaintext
Copy code
https://www.google.com/search?q=site:[target-domain]+intitle:%22index+
of%22
●
LinkedIn
: Use LinkedIn to identify current employees,
their
roles, and departments. This can help narrow down targets for
social engineering or provide insights into the organization's
structure.
●
Twitter, Facebook, Instagram
: Employees may post company
information on these platforms, which can inadvertently disclose
internal systems or projects.
●
Social Mapper
: This OSINT tool can link employees'
profiles
across various social media platforms, useful for building
comprehensive social profiles.
Example searches:
plaintext
Copy code
"CompanyName" site:linkedin.com
"CompanyName" "security team" site:twitter.com
●
Domain Intelligence
: Reverse WHOIS, historical DNS,
Certificate
Transparency logs.
●
Infrastructure Recon
: Reverse IP lookups, ASN and
IP range
analysis, Passive DNS.
●
Metadata and File Analysis
: Extracting metadata from
public
documents, GitHub leaks.
●
Social Media and Employee Profiling
: LinkedIn, job
listing
analysis, employee social media profiling.
●
Internet-wide Scanning
: Censys, BinaryEdge, ZoomEye
for exposed
services.
●
Archived Content and Cloud Bucket Checks
: Wayback
Machine,
CommonCrawl, cloud storage enumeration.
●
Automation and Frameworks
: Recon-ng, SpiderFoot, OSINT
Framework.