Basic Recon on Domain/Company name to support network pentest
Overview
Below is a list of the current techniques I use to do a basic recon search for an organization prior to a network pentest. There are a number of APIs in use (All are free minus DeHashed) that you will need to register for prior to running (see API Keys). This API registration process shouldn't take more than an hour or two.
I would recommend keeping the API key file subfinder-keys.yaml in a password manager and pasting it in for each run. The below command will remove the file after subfinder runs
All of the below block of code are made to copy/paste straight into a shell. If any input is needed from you, it will prompt for it or drop you into a vim editor.
Install Tools
sudoaptinstallsubfindermillerxxdsudosubfinder-upsubfinder-lsgoinstall-vgithub.com/projectdiscovery/httpx/cmd/httpx@latestmv"$HOME/go/bin/httpx""$HOME/go/bin/httpx-ng"# Competing package names on kali# pipx install git+https://github.com/hmaverickadams/DeHashed-API-Tool # Changes not mergedpipxinstallgit+https://github.com/d-woosley/DeHashed-API-Tool
Setup
API Keys
Subfinder will need a number of API to get good results from subdomain searches. The ones listed below are all available via free trails that should be sufficient for most pentest use cases. You will need to create an account and get an API key for each service. There are more free APIs out there, this is just the list of APIs that I could easily identify and sign up for without paying.