What to look for:
DNS lookup
host hackersploit.com
robot.txt
Specifying folders or files that should not be indexed by search engine.
sitemap.xml
File in xml that is used to provide search engine and organised way to index a web page. Sitemap can sometimes reveal links that is not presented on the main web page.
Web technology footprintin
whatwebDownloading a website
https://httrack.com - useful to analyse source code of the website.
Whois lookup - getting information about a domain. ls Information to look for:
whois zonetransfer.me or whois 172.67.155.53 or https://whois.orgUse to gather information about the target domain. https://www.netcraft.com/
Records associated with a domain. Looking for:
dnsrecon
dnsrecon -d zonetransfer.me
DNSdumpster
https://dnsdumpster.com/
Identify if web application is protected by a firewall.
# list out the WAF that the tool can detect
wafw00f -l
# testing single waf instance
wafw00f hackertube.net
# testing all waf instances
wafw00f hackertube.net -a
sublist3r -d hackersploit.org -e google, yahoo
sublist3r -d hackersploit.org
Note: there maybe no results because the search engines has rate limiting
site:ine.com
site:ine.com inurl:admin
site:*.ine.com
site:*.ine.com intitle:admin
# directory listing
intitle: index of
cache:ine.com
inurl:auth_user_file.txt
inurl:wp-config.bak
https://www.exploit-db.com/google-hacking-database
https://github.com/laramies/theHarvester
theHarvester -d hackersploit.org -b rapiddns
DNS Server - Cloudflare(1.1.1.1), Google(8.8.8.8) DNS Records - A, AAAA, NS, MX, CNAME, TXT, HINFO, SOA, SRC, PTR
DNS interrogation
DNS Zone Transfer https://digi.ninja/projects/zonetransferme.php. DNS zone transfer uses the AXFR protocol, it copies DNS records to another DNS servers. Security problems with DNS Zone Transfer such information can be leaked.
Note
Zone transfer needs to be enabled.
# Getting a copy from the primary server
dig axfr @nsztm1.digi.ninja zonetransfer.me
dnsenum zonetransfer.me
Host files
/etc/hosts
fierce
https://github.com/mschwager/fierce
Use to actively enumerate sub domains (bruteforce).
fierce --domain zonetransfer.me
Discover devices on the network. Ping scan, no port scan.
# -sn IMCP echo
sudo nmap -sn 192.168.0.0/24
# uses arp requests
sudo netdiscover -i en0 -r 192.168.0.0./24
nmap default scan: SYN scan, 1000 common ports Windows will block icmp pings.
# Peform port scan don't ping
nmap -Pn 192.168.0.134
# Specify port
nmap -Pn -p 80 192.168.0.134
# All ports
nmap -Pn -p- 192.168.0.134
# Port range
nmap -Pn -p1-1000 192.168.0.134
# Fast scan 100 common ports
nmap -Pn -F 192.168.0.134
# udp port scan
nmap -Pn -sU 192.168.0.134
# verbose
nmap -Pn -sU 192.168.0.134 -v
# service version
nmap -Pn -F -sV 192.168.0.134
# operating system
nmap -Pn -O 192.168.0.134