Active

Directly interacts with a target system to obtain information.

Automated


Infrastructure

Technology Stack

Tool
Details

whatweb -v <DOMAIN> whatweb -v -a <LEVEL_AGGRESSIVE> <DOMAIN>

WAF

Tool
Details

Allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website. wafw00f -v -a <DOMAIN>

Subdomain & Vhost

Tool
Details

Subdomain passively via online sources. subfinder -d <DOMAIN>

gobuster dns [-r <SERVER_DNS>] -d <DOMAIN> -w <WORDLIST>

Create the list with own NameServers/Domain (ex., myResolver.txt) subbrute.py -r myResolver.txt <DOMAIN> [-s <WORDLIST>]

ffuf -c -w <WORDLIST>:X -u http://X.<DOMAIN>/ ffuf -c -w <WORDLIST>:X -u http://<IP:PORT or DOMAIN>/ -H 'Host: X.<DOMAIN>'

Zone Transfer

Zone Transfer is how a secondary (slave) DNS server receives information from the primary (master) DNS server and updates it. The primary DNS server may not be configured correctly. If we can successfully perform a zone transfer for a domain, we will get all the information available for that domain.

  1. Need to find all possible Subdomains and Name Servers.

  2. Need to perform Asynchronous Full Transfer Zone (AXFR) queries on each element found at 1.

Tool
Details

host

host -l <DOMAIN> <SERVER_DNS>

nslookup

nslookup -type=any -query=AXFR <DOMAIN> <SERVER_DNS>

dig

dig axfr @<SERVER_DNS> <DOMAIN>

Port & Host scanning

Finding the active host and ports for then proceeding with services enumeration.

Command
Description

nmap -sn <NETWORK>

ARP scan.

nmap -sn -PE/-PS/-PA/-PU <NETWORK>

ICMP/TCP-SYN/TCP-ACK/UDP scan.

--disable-arp-ping

Disable ARP.

--packet-trace, --reason

For investigating.


Tool
Details

Internet-scale port scanner, for very large networks sudo masscan <NETWORK>

ICMP scan fping -a -q -g <NETWORK>

ARP scan arp-scan -g -S <SOURCE_MAC> -i <INTERFACE> <NETWORK>

The Modern Port Scanner rustscan -a <IP> [<NMAP OPTIONS>]

netcat

for i in $(seq 1 254); do nc -zv -w 1 X.X.X.$i 445;done

Last updated