Researching a target with passive reconnaissance tools
Conclusion
There are many ways of performing recon online without ever going near a potential target. Attackers will take advantage of tools like the ones described in this article. If you're serious about thinking like an attacker, you can use these tools to do your own reconnaissance and determine how much of your data is exposed online. I encourage you to spend lots of time on the OSINT Framework site to gain a better understanding of the passive reconnaissance tools currently in use.
Infos
- "Indexing HTTPS Pages by Default": https://developers.google.com/search/blog/2015/12/indexing-https-pages-by-default
- crt.sh: https://crt.sh
- Sectigo: https://sectigo.com
- DNSDumpster: https://dnsdumpster.com
- OSINT Framework: https://osintframework.com
- DNS History: http://dnshistory.org
- 8086 Consultancy: http://www.8086.net
- Dehashed: https://www.dehashed.com
- Have I Been Pwned?: https://haveibeenpwned.com
- Notification at Have I Been Pwned?: https://haveibeenpwned.com/NotifyMe
- "The 15 Biggest Data Breaches of the 21st Century": https://www.csoonline.com/article/2130877/the-biggest-data-breaches-of-the-21st-century.html
- Dehashed Data Wells: https://dehashed.com/data
« Previous 1 2
Buy this article as PDF
Express-Checkout as PDF
Price $2.95
(incl. VAT)
(incl. VAT)