EJPT
EJPT
Using WHATWEB:
whatweb target.com
Also we can use hTTrack to download whole websites(din't knew useful maybe)
Whois is enum:(passive info gathering)
whois target.com
Get the details like domain server url, registrar name, contact details, url
registration date , expiry date etc..
GOOGLE DORKING:
A very useful website with lotof usefulgoogle dorks
(https://taksec.github.io/google-dorks-bug-bounty/)
Basic dorks
site:ine.com (only results for ine.com)
site:ine.com inurl:admin (searching for admin panels or specific thing for a web
login forms etc anything)
site:*.ine.com (showing all domains tht ends with ine.com. Sub domain enumeration
with google dorking)
site:*.ine.com intitle:admin (subdomains with admin in their url)
site:*.ine.com filetype:pdf (to serach for pdf files on ine.com can use xml,csv,ppt
etc any)
intitle:index of google.com (any web you want to search for)
WAYBACK MACHINES is also a very useful tool to look for sub domains cached data of
web can lead to sensisteve data sometimes or can even show what a website looked
like in its' old time specify the time.
Seraching for files like passwords keys etc
inurl:auth_key target.com
inurl:apikeys target.com
We can also do github dorking for a target it can sometimes leak passowrds,api
keys,sensitev info the dev forgot to remove.
Look for useful dorks GHDB(google hacking database).
ACTIVE INFORMATION GATHERING(interacting with the host deeper dive into the host):
DNS ZONE TRANSFERS:
What is dns?(domain name system)
A Dns is like telephone book having all domain names and their ip addreses like whe
click on a contact on phone and it knows what number to dail when a specific
contact name is clicked ssme with dns server.
Contents of a DNS server:
A:domain name or domain ipv4 address
AAAA:domain name or domain ipv6 addresses
MX: mail server
TXT: text records
CNAME: domain aliases
HINFO:host info
SOA:domain authority
DNS interrogation:
finding the mail server,subdomains,dns records for specific ip address or domain.
LAB:
Windows Recon:
It was nothing much was just asked to do a nmap scan identify all open ports and
their services script scan which was taught in the vedio
END:)
:Asessment Methodologies: Information Gathering: