Best Tools for Information Gathering

Information Gathering (Reconnaissance)

In this write-up, I’ll go through the best tools used by penetration tester to do Information Gathering.

Identifying Our Target:

Before we begin we have to establish a client to attack, so I picked up Tesla from bugcrowd programs.

please double check when you read this if tesla still exists or not, if for any reason Tesla passed out you must pick up other client.any other behavior out of this scope it’s in your risk.

There are so many tools to do reconnaissance but here we try to have a realistic approach and a realistic methodology when you came to do a penetration test, so when we first start will look up items on the website regarding users, email format, and breach credentials.

1-hunter.io

hunter.io is a domain search, we can search tesla.com this will give us a list of people on the organization and will give us the most command pattern of the Email addresses. in top of this may not all of them works there so we can go to LinkedIn and check if that person really works there.

knowing the email format ‘{f}{last}@tesla.com’ is supper important liter on when we perform attacks. say we have a login form if you know the form of the email address we can send a bunch of valid email addresses to it as user name and then we can use something like password spraying which we just take the commonly used passwords.

2-theHarvester

theHarvester is a tool build in with kali Linux it helps us to identify some usernames and even some subdomains.

$theHarvester -d tesla.com -l 500 -b google

  • -d : to specify the domain name.
  • -l : limit the number of search results, default=500.
  • -b : to specify the source to get information from, note that some of these sources required API key.

3-sublist3r

sublist3r is a tool to identify subdomains, if we look in scope will see *.tesla.com the char * means any domain or subdomain ended with .testa.com is in scope this will give us more range to look around and will not limit us only in tesla.com. to search for these subdomains we can use sublist3r.

[-] Total Unique Subdomains Found: 187

4-crt.sh

this website uses certificate fingerprint to identify domain names, Organization Name, etc.

instead of using wildcard ‘*’ we have to use % so when we search about %.tesla.com will be like %.tesla.com.

this is great because it will not look only for subdomains it looks also for sub of subdomains.

not all these subdomains will work in search engines but it worth knowing about them, to check if these work or not you can use tomnomnom httprobe tool. always check the help and man menu by -h ,— help or man<tool _name> to see more details about any tools in Linux.

5-builtwith

this goes out and it looks at what type of tech Tesla is running.

it gives all the stiff that can see Google analytics salesforce, the Widgets they are running, and also the Frameworks. this is a great resource that can get more information from it.

6-Wappalyzer

Wappalyzer is extinction for firefox it gives you an indication right away of what’s going on. it’s still passive recon. as we are not doing anything that would be out of the norm.

7-whatweb

WhatWeb identifies websites.it recognizes web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices.

whatweb is tool preinstalled in kali so we can run it as following

$whatweb <target url>

8-Burp Suite

Burp Suite is a web proxy that means it has the capability to intercepting traffic for us. by putting the URL of the website in the scope then navigate the website and burp suite will give you a nice site map.

9-Google Fu

what makes you really good pentester is the ability to google. being able to look this stuff up in your own and able to find your own resources and find solutions to your problems are going to make you way better.

in this, I will show you just a few things that we can use to search for and how we can start narrowing down some results.

you can use suite:tesla.com that will give us all sites end with tesla.com, but what if I don’t want www.tesla.com in this case you can use -www this will exclude www.tesla.com from poping up this also another way to find subdomains, what if we want only pdf files that belong to tesla then we can add type file:pdf.

the point of doing this is we are looking at potentially sensitive files out there or more information to make your work easier. like backup files credentials source codes etc.

10-Linkedin

By search on social media especially in LinkedIn, you can find so much stuff about the company that you looking for or even employees of this company. we can click any picture and look for things like badge photos or desktop fixtures or even ID cards.

other thing that is excellent in LinkedIn is you can see all people who work there, and take the names I hope you remember the format of the email that we find it before so we can do so much stuff with that.

Linkedin shows people who visited your profile, so make sure to use fake account or any other trick to avoid that.

I hope this is carried out a lot of benefits and information to you, stay safe Bye Bye.

--

--

--

Love podcasts or audiobooks? Learn on the go with our new app.

IoT: Onion Omega 2. Short and successful story of a “brick” that became alive!

How I hacked into the College Computers

ROP Chain Exploit with Example

Penetration Testing in the Financial Domain

The history of Spam. From Middle Ages till now

Hypersign - A cross-chain Identity protocol

Millions of Americans teleworking is a huge security risk.:

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Abdullah Baghuth

Abdullah Baghuth

More from Medium

Starting My First Cloud Honeypot

SaaS Application Access Creates Security Concerns

Using the Flipper Zero to swipe AWS keys from MacOS

How to create a Base (secure) Configuration for a Cisco Switch.