Objective: Conduct passive reconnaissance using OSINT techniques.
Use only publicly available data (OSINT).
No active scanning or exploitation.
Focus on passive reconnaissance techniques.
Website & Domain:
Example: https://www.XYZTelecom.com
Check robots.txt
for restrictions.
Analyze source code for hidden comments, API keys.
WHOIS Lookup:
Tool:
Command:
Extract Details:
Registrar name
Creation & expiration date
Contact emails (if visible)
Google Dorking:
Example Queries:
LinkedIn Scraping:
Tool: theHarvester
Command:
Email Permutations:
Use Hunter.io
to find email patterns.
Example format: firstname.lastname@XYZTelecom.com
Find subdomains:
Tools: Sublist3r
, Amass
, crt.sh
Command:
Extract DNS records:
Tool: dig
Command:
Wappalyzer Browser Extension
WhatWeb CLI Tool:
Shodan Search:
Query:
Look for:
Open SSH, FTP, RDP, database ports
Outdated software versions
Cloud Storage Misconfigurations:
Google Dorking:
Identify potential phishing attack vectors.
Check for leaked credentials on haveibeenpwned.com
.
AcmeCorp uses WordPress with outdated plugins.
Employee emails follow first.last@XYZTelecom.com
format.
Exposed subdomain: vpn.XYZTelecom.com
.
Shodan reveals an exposed database server (security risk).
Enforce strong password policies.
Update and secure outdated software.
Restrict publicly exposed services.
Educate employees on phishing risks.
BuiltWith: