Recon
Recon
Recon
Google Dorking:
Minus(-x) = excludes x
Reverse WHOIS can find registered domains for an individual or company name
Browser bookmark for this
IP Addresses:
Certificate Searches:
Use crt.sh (bookmarked) to find alternate domain names using the same
certificate
(aka subdomains)
Subdomain Enumeration:
After finding many domains on the target, enumerate with sublist3r to find
subdomains for each
Service Enumeration:
Directory Brute-forcing:
Web crawling:
Actually opening each url on a page and then each url from each of those
pages and so on.
Use the crawler in Burp Suite
Github Recon:
Once you have found a file of interest, check the Blame and History sections
to see how it was developed
Look for hardcoded secrets like API keys, encryption keys, and database
passwords
Pay special attention to code that deals with user input, such as HTTP
request
parameters, HTTP headers, HTTP request paths, database entries, file uploads,
etc.
Fingerprinting:
In Burp, send a request to the server to check the HTTP headers. A server
might
leak useful info: