310information Gathering
310information Gathering
310information Gathering
S e c t i o n 0 3 | M o d u l e 0 1
© Caendra Inc. 2019
All Rights Reserved
Table of Contents
✓ What OSINT is
Introduction
Open-Source
Intelligence
Example:
If the client is an advertising company, checking Instagram would
be a great idea.
If you choose “All Filters”, you will notice that even more search criteria appears:
https://www.sam.gov/
http://www.gsaelibrary.gsa.gov/
$ whois apple.com
The more you know your target, the easier the later phases
of your pentest will be.
Many mail systems tend to inform the sender that mail was
not delivered because it does not exist.
You should carefully inspect which of your sent emails did not
generate such a message, which will be the one that will have the
correct corporate mail schema.
Image Source: https://i1.wp.com/www.dbuggers.com/wp- PTSv4: Section 3, Module 1 - Caendra Inc. © 2019 | p.40
content/uploads/2018/10/Mail-Delivery-Failed.png?resize=696%2C277&ssl=1
1.3
Subdomain
Enumeration
You can try this by typing the following in Google’s search engine
site: company.com
PTSv4: Section 3, Module 1 - Caendra Inc. © 2019 | p.46
1.3 Subdomain Enumeration
Subdomain Enumeration
In the subdomain
enumeration video you
will get to know various
techniques to enumerate
your target’s subdomains.
*Videos are only available in Full or Elite Editions of the course. To upgrade, click HERE. To access, go to
the course in your members area and click the resources drop-down in the appropriate module line.
The Importance of
Information Gathering
Information gathering
Facebook
https://www.facebook.com/
LinkedIn
https://www.linkedin.com/
Twitter
https://twitter.com/
DNSdumpster.com
https://dnsdumpster.com/
Sublist3r
https://github.com/aboul3la/Sublist3r
*Videos are only available in Full or Elite Editions of the course. To upgrade, click HERE. To access, go to the course in your
members area and click the resources drop-down in the appropriate module line.