Recon For Web Pen-Testing
Recon For Web Pen-Testing
medium.com/@theUnixe/recon-for-web-pen-testing-6a6333673818
theUnixe
Reconnaissance, or recon for short, is the process of gathering information about a target
to identify vulnerabilities and potential attack vectors.
In this article, we’ll discuss a step-by-step approach to web pen-testing recon, starting
with the sketch to more advanced techniques.
So, Whenever I start any subdomain the first thing, I do is start my passive recon. Below I
mentioned every tool/website I use.
Dig: Stands for Domain Information Groper,Dns lookup by querying name servers
and displaying the result to you!!
~#root㉿kali:
1/17
Wayback machine to view old files likes robots.txt and URLS
waybackurls.py
Download:
https://gist.github.com/mhmdia/adf6bff70142e5091792841d4b372050
2/17
— Knockpy: —
github.com
— Sublist3r: —
github.com
— SubBrute: —
3/17
SubBrute is a community driven project with the goal of creating the
fastest, and most accurate subdomain enumeration…
github.com
Google Dork:
Online Resource:
– https://dnsdumpster.com/
– https://searchdns.netcraft.com/
– https://www.virustotal.com (Go
to search and
type target.com)
Tool: SubBrute
./subbrute.py –t subdomains.txt
dnsx:is a fast and multi-purpose DNS toolkit designed for running various probe
through the retryabledns libery.Usage: https://github.com/projectdiscovery/dnsx
4/17
Ffuf: iS a fast directory fuzzing tool, you can use it to enumerate more
directories in less amount of time!!
~#root㉿kali:
Now We Ha ve
5/17
WaybackURls
+
Subdomains
+
Subdomains of Subdomains
github.com
provide a list of all subdomains and it will give you like a report with screenshots of all
sub-domain
url: https://bgp.he.net/
Search by Target IP
6/17
Real Case Study_-
(98.136.0.0–98.139.255.255)
Bash Script
Censys: is another great online tool that will give you juicy information about
your target!!
censys.io: https://censys.io/
Photon: is basically a data extraction tool which helps us find many useful
information from the websites.
Download: https://github.com/s0md3v/Photon
7/17
DnsDumpster: is very similar to dig,is it provides a GUI for you to work on.
Usage: https://dnsdumpster.com/
Github Recon
• API Endpoints
• Domain Patterns
8/17
Google can also helpsite: “github.com” + “Target” + password
p Addresses.
SSL Certificates.
Services.
Favicon Hashes.
etc
9/17
Zoomeye: is another search engine and can be use to discover..
Web Servers.
IP & Ports.
Headers & Status Codes.
Vulnerabilities.
etc.
usage:https://www.zoomeye.org/
Content Discovery: —
10/17
• Google is your friend
• Use Google Dork to find:-
- File Extensions
- Parameters
- Login Page
- Sometimes
Directory Structure
- Important Stuff
Find Parameter
• Google Dork:
(Note: if site has register page, there are chancesthat site also have login page)
11/17
Tools:
Gobuster- https://github.com/OJ/gobuster
Dirsearch- https://github.com/maurosoria/dirsearch
Feroxbuster- https://github.com/epi052/feroxbuster
paramSpider- https://github.com/devanshbatham/ParamSpider
assetfinder:https://github.com/tomnomnom/assetfinder
subzy: https://github.com/LukaSikic/subzy
To help me with this hunt, I use a good tool called Arjun. This python script will bruteforce
the GET and POST parameters. Try and you will see!
Download:
12/17
HTTP Parameter Discovery Suite Arjun can find query parameters for URL
endpoints. If you don't get what that means…
github.com
Download: https://github.com/GerbenJavado/LinkFinder
Vulnerability Scanning
Nuclei: it’s extremely good and you can make your own templates in YAML and use
thousands of other templates by other hackers!!
13/17
Nikto: https://github.com/sullo/nikto
Download: https://github.com/0xInfection/TIDoS-Framework
Usage: ./tidos.py
BurpSuite —
Run Spider tool on your target in Burp Suite
14/17
Zscanner
Once copied, paste them into urls.txt• Put urls.txt file in the root of ZscannerEg.
c/xampp/htdocs/zscanner/urls.txt• Now open zscanner in browser
Eg. c/xampp/js-scan/JS-output.txt
15/17
JS-Scan
Open JS-Scan in browser
Takeaways
• Endpoints extracted from JS files are more
vulnerable then Endpoints defined in
WebPages.
16/17
AWS Hacking
Open Terminal
Thank You!!
17/17