Active

Directly interacts with a target system to obtain information.

Tools
Details

Designed to take screenshots of websites provide some server header info, and identify default credentials if known. eyewitness --web -x <nmap_scan>.xml -d <output_name> eyewitness --web -x <nessus_scan>.xml -d <output_name> eyewitness -f <subdomains> -d <output_name>

Tool for visual inspection of websites across a large amount of hosts and is convenient for quickly gaining an overview of HTTP-based attack surface. cat <nmap_scan>.xml | ./aquatone -nmap

Automated


Infrastructure

Technology Stack

Tool
Details

whatweb -v <DOMAIN> whatweb -v -a <LEVEL_AGGRESSIVE> <DOMAIN>

WAF

Tool
Details

Allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website. wafw00f -v -a <DOMAIN>

DNS Subdomain & Vhost

Tool
Details

Script for DNS info and specific scans dnsrecon -d <DOMAIN> [-n <SERVER_DNS>] dnsrecon -d <DOMAIN> -D <WORDLIST> -t brt (bruteforce) dnsrecon -d <DOMAIN> -r <RANGE> (reverse lookup)

Script that autoenumerates DNS subdomain dnsenum <DOMAIN> [--dnsserver <SERVER_DNS>]

Bruteforce subdomain gobuster dns [--resolver <SERVER_DNS>] -do <DOMAIN> -w <WORDLIST> -ne

Try to find Vhost ffuf -c -w <WORDLIST>:X -u http://X.<DOMAIN>/ ffuf -c -w <WORDLIST>:X -u http://<IP:PORT or DOMAIN>/ -H 'Host: X.<DOMAIN>'

Create the list with own NameServers/Domain (ex., myResolver.txt) subbrute.py -r myResolver.txt <DOMAIN> [-s <WORDLIST>]

Zone Transfer

Zone Transfer is how a secondary (slave) DNS server receives information from the primary (master) DNS server and updates it. The primary DNS server may not be configured correctly. If we can successfully perform a zone transfer for a domain, we will get all the information available for that domain.

  1. Need to find all possible Subdomains and Name Servers.

  2. Need to perform Asynchronous Full Transfer Zone (AXFR) queries on each element found at 1.

Other tools such as dnsrecon and dnsenum already perform zone transfer checks.

Tool
Details

host

host -l <DOMAIN> <SERVER_DNS>

nslookup

nslookup -type=any -query=AXFR <DOMAIN> <SERVER_DNS>

dig

dig axfr @<SERVER_DNS> <DOMAIN>

Port & Host scanning

Finding the active host and ports for then proceeding with services enumeration.

ARP on the same subnet, otherwise ICMP

Command
Description

nmap -sn <NETWORK>

Host discovery, no port scan.

nmap -iL <FILE>

Input from list of hosts/networks

nmap -sn -PE/-PS/-PA/-PU <NETWORK>

ICMP/TCP-SYN/TCP-ACK/UDP scan.

--disable-arp-ping

Disable ARP.

--packet-trace, --reason

For investigating.

Ping Sweep

Do this at least twice to be sure.

Terminal
Details

Linux

for i in {1..254} ;do (ping -c 1 X.X.X.$i | grep "bytes from" &) ;done

CMD

for /L %i in (1 1 254) do ping X.X.X.%i -n 1 -w 100 | find "Reply"

PowerShell

1..254 | % {"172.15.5.$($): $(Test-Connection -count 1 -comp 172.15.5.$($) -quiet)"}

Last updated

Was this helpful?