Basic Pentest Recon
Basic Recon on Domain/Company name to support network pentest
Overview
Below is a list of the current techniques I use to do a basic recon search for an organization prior to a network pentest. There are a number of APIs in use (All are free minus DeHashed) that you will need to register for prior to running (see API Keys). This API registration process shouldn't take more than an hour or two.
Recon Checks:
All of the below block of code are made to copy/paste straight into a shell. If any input is needed from you, it will prompt for it or drop you into a vim editor.
Install Tools
sudo apt install subfinder miller xxd
sudo subfinder -up
subfinder -ls
go install -v github.com/projectdiscovery/httpx/cmd/httpx@latest
mv "$HOME/go/bin/httpx" "$HOME/go/bin/httpx-ng" # Competing package names on kali
# pipx install git+https://github.com/hmaverickadams/DeHashed-API-Tool # Changes not merged
pipx install git+https://github.com/d-woosley/DeHashed-API-ToolSetup
API Keys
Subfinder will need a number of API to get good results from subdomain searches. The ones listed below are all available via free trails that should be sufficient for most pentest use cases. You will need to create an account and get an API key for each service. There are more free APIs out there, this is just the list of APIs that I could easily identify and sign up for without paying.
subfiner-keys.yaml template
Run
Subdomain Enumeration
Cloud Enumeration
Breached Credentials Lookup
American Registry for Internet Numbers (ARIN) Data
Package/Export Results
Last updated