🕵️
HowToHunt
  • HowToHunt.md
  • API Testing
    • Hidden API Functionality Exposure
    • Reverse Engineer an API
  • Account Takeover Methodology
    • Account Takeover Methodology
  • Application Level DoS
    • Application Level DoS Methods
  • Authentication Bypass
    • 2FA Bypasses
    • OTP Bypass
    • Account Ban Bypass
  • Broken-Link Hijacking
    • Broken-Link Hijacking
  • Broken Auth And Session Management
    • Session Based Bugs
  • CMS
    • AEM
    • Drupal
    • Wordpress
    • Moodle
  • CORS
    • CORS
    • CORS Bypasses
  • CSRF
    • CSRF
    • CSRF MindMap
    • CSRF Bypass
  • Finding CVEs
    • CVES
  • CheckList
    • Web Application Pentesting Checklist
    • Web Checklist by Chintan Gurjar.pdf
    • Web Checklist by Tushra Verma.pdf
    • Mindmap by Rohit Gautam
    • Mindmap by Cristian Cornea
  • Web Page Source Code Review
    • Web Page Code Review Tips
  • EXIF Geo Data Not Stripped
    • EXIF Geo Data Not Stripped
  • File Upload Bypass
    • File Upload Bypass
  • Find Origin IP
    • Find Origin
  • GraphQL
    • GraphQL
  • HTTP Desync Attack
    • HTTP_Desync
  • Host-Header Attack
    • Host-Header
  • HTML-Injection
    • HTML-Injection
  • IDOR
    • IDOR
  • JWT ATTACK
    • JWT
  • JIRA ATTACK
    • JIRA
  • MFA Bypass
    • MFA Bypasses
    • 2FA-Bypass
  • Misconfigurations
    • Default Credential And Admin Panel
    • Docker
    • S3 Bucket
  • OAuth
    • OAuth
    • OAuth Hunting
  • Open Redirection
    • Find OpenRedirect Trick
    • Open Redirection Bypass
  • Parameter Pollution
    • Parameter Pollution In Social Sharing Buttons
  • Password Reset Functionality
    • MindMap
    • Password Reset Token Leakage
    • Account_Takeover_By_Password_Reset_Functionality
    • Password_Reset_Flaws
  • Rate Limit
    • Rate Limit Flaws
    • Rate-Limit Bypass
    • No Rate-Limit on Verify-PhoneNo
    • No Rate-limit on Invite User
    • No Rate-limit on Promo
    • No Rate-limit on Verify-email
    • No Rate-limit on forget-password
  • Race Condition
    • Race Condition
  • Recon
    • Github
    • Recon Workflow
    • Subdomain Enumeration
  • SQLi
    • SQL Injection.md
  • SAML
    • SAML
  • SSRF
    • SSRF
    • Blind SSRF
  • SSTI
    • SSTI
  • Sign Up Functionality
    • Sign Up Bugs
    • Sign Up MindMap
  • Sensitive Info Leaks
    • Github Recon Method
    • Github-Dorks
    • Github Dorks All
    • Google Dorks
    • Shodan CVE Dorks
    • Version Leaks
  • Status Code Bypass
    • Status_Code_Bypass Tips
    • 403 Bypass
  • Subdomain Takeover
    • Subdomain Takeover - Detail Method
    • Subdomain Takeover - Easy Method
    • Subs or Top level Domain
  • Tabnabbing
    • Tabnabbing
  • WAF Bypasses
    • WAF Bypass Using Headers
  • Weak Password Policy
    • Weak Password Policy
  • XSS
    • XSS
    • Bypass CSP
    • XSS Bypass
    • Automated XSS
    • Post Message Xss
  • XXE
    • XXE Methods
    • Billion Laugh Attack
Powered by GitBook
On this page
  • Recon workflow
  • ASN Discovery
  • Discovering Brands
  • Author
  1. Recon

Recon Workflow

PreviousGithubNextSubdomain Enumeration

Last updated 4 years ago

Recon workflow

  1. IP space discovery

  2. TLDs, Acquisitions, & Relations

  3. Subdomain Enum

  4. Fingerpirnting

  5. Dorking

  6. Content Discovery

  7. Parameter Discovery

ASN Discovery

ASN Discovery of Target:

ASN using whois:

whois -h whois.cymru.com $(dig +short example.com)

NOTE: Be careful cause sometimes you might get ASN for VPSs like digital ocean etc. Don't work on them.

Using Nmap & ASN for discoverying IP related to the targetted ASN

nmap --script targets-asn --script-args targets-asn.asn=<ASN Number>

Gathering Company intel using AMASS

amass intel -org <Organisation name(not domain)>

ARIN for ASN:

Site: IPINFO for ASN

Subdomains using ASNs using AMASS:

amass intel -asn <ASN_number>

Discovering Brands

-Looking for acquisition or related orgs to target

  • wikipedia

  • Crunchbase

  • Owler

  • Accquiredby

  • LinkedIn

  • ReverseWhois using amass intel module

    amass intel -d [domain.com](http://domain.com) -whois

  • BuiltWith

  • Google dork:

intext:"copyright ©️ org_name"

  • Shodan Dork using HTTP favicon hashes

http.favicon.hash:<hash>

Author

Favicon hash can be found using

https://bgp.he.net
https://whois.arin.net
https://ipinfo.io
Crunchbase: Discover innovative companies and the people behind them
AcquiredBy | Definitive list of bootstrapped acquisitions
BuiltWith
favfreak
Mr._fr3qu3n533