During the reconnaissance phase of a penetration test being able to discover the external assets of an organization is extremely important. It is also important to do so as stealthily as possible. Using open-source techniques and tools it is possible to enumerate an organizations external assets without sending any data directly from your computer system to the target organization's subnets. In this episode of Tradecraft Security Weekly Beau Bullock (@dafthack) discusses some of the tools and techniques that can be used to do this. LINKS: Recon-ng: https://bitbucket.org/LaNMaSteR53/recon-ng Datasploit: https://github.com/DataSploit/datasploit Spiderfoot: http://www.spiderfoot.net/ Censys: https://censys.io/ Shodan: https://www.shodan.io/ Threatcrowd: https://www.threatcrowd.org/ HackerTarget: https://hackertarget.com/ Netcraft: https://www.netcraft.com/ Certificate Search Tool - crt.sh Internet-Wide Scan Data Repository - scans.io Full Show Notes: https://wiki.securityweekly.com/TS
OSINT & External Recon Pt. 1: Host Discovery – Tradecraft Security Weekly #8
During the reconnaissance phase of a penetration test being able to discover the external assets of an organization is extremely important. It is also important to do so as stealthily as possible. Using open-source techniques and tools it is possible to enumerate an organizations external assets wit...
Full Segment Notes
Stay in the Know, No Smoke and Mirrors – Join Our Newsletter
Get expert insights and technical breakdowns straight to your inbox.
You can skip this ad in 5 seconds