Intigriti Profile picture
Global Bug Bounty & VDP Platform. ๐ŸŒ: https://t.co/fgCupJckrW โ–ถ๏ธ: https://t.co/lRfCzZBgb7 ๐Ÿ‘พ: https://t.co/Inf7N9VQIl

Oct 18, 2022, 14 tweets

12 #recon tools you NEED to know about! ๐Ÿงต

Recon, the gathering of information about your target, is becoming more and more important! ๐Ÿง 

Here are the tools to help you spot subdomains, vhosts, S3 buckets, parameters and more faster and more effective than the others ๐Ÿ‘‡

[1๏ธโƒฃ] DNS
This DNS toolkit by @pdiscoveryio can do a lot! But let's focus on reverse DNS lookups ๐Ÿ‘€
Often, you have a huge list of IP addresses ๐Ÿ“œ
Just like resolving a domain to an IP, you can also try doing the opposite using PTR records!
Et voila! Domains to continue recon! ๐Ÿ‘‡

[2๏ธโƒฃ] Amass
This network mapping tool by @owasp is incredible, but let's hone in on doing subdomain enumeration. ๐Ÿ•ธ
The main domains companies use are often well-secured. But what about the domain that nobody knows about? Those can be riddled with bugs! ๐Ÿ›
Let's find them! ๐Ÿ‘‡

[3๏ธโƒฃ] @nmap
Nmap stands for "Network Mapper" and that's precisely what it does.
This 25-year-old tool is FAR from outdated!
Let's use Nmap to find out what's actually running on those endless machines you've enumerated so far! ๐Ÿ‘‡

[4๏ธโƒฃ] VHostScan
This Python scanner by @codingo_ is an excellent tool for finding virtual hosts! ๐Ÿ‘จโ€๐Ÿ’ป
What's that? Unlike subdomains, vhosts allow multiple applications to be hosted on a single server. ๐Ÿ–ฅ
This slightly esoteric feature means not many hunters are looking for this! ๐Ÿ”

[5๏ธโƒฃ] Httprobe
All this recon has given us many subdomains, but what now? ๐Ÿคทโ€โ™‚๏ธ
This tool by @TomNomNom will help us find all the web servers running on these subdomains! ๐Ÿ‘‡

[6๏ธโƒฃ] Waybackurls
Another tool by @TomNomNom can help us continue.
Instead of opting for active directory fuzzing, let's use the power of history to see what we can find on a target's website!
This tool uses the @waybackmachine to find new endpoints passively! ๐Ÿ‘‡

[7๏ธโƒฃ] S3enum
This Go tool by @koenrh automates AWS S3 bucket enumeration.
Using this tool, you may be able to find the next big misconfiguration or overly permissive S3 bucket! ๐Ÿ‘‡

[8๏ธโƒฃ] EyeWitness
If you're overwhelmed with endpoints, that's okay!
Let's bring some order to this madness using this tool by @FortyNorthSec ๐Ÿ’ช
It allows you to organize endpoints depending on their return value quickly. Screenshots of the page are a bonus! ๐Ÿ–ผ

[9๏ธโƒฃ] Relative URL extractor
JavaScript files are recon goldmines! They sometimes reference very interesting relative URLs that you need to know about! ๐Ÿง 
But manually going through 1000s of JS files, no! ๐Ÿช“
Use this great tool by @jobertabma ๐Ÿ‘‡

[1๏ธโƒฃ0๏ธโƒฃ] TruffleHog
If you're lucky, you may have found a git repository during your recon! ๐Ÿ€
Let's use this tool by @trufflesec to dig into it and uncover all secrets the repo has to hold! ๐Ÿ‘‡

[1๏ธโƒฃ1๏ธโƒฃ] Arjun
Let's talk about enumerating GET parameters!
If you were thinking of brute-forcing thousands of them, then check out Arjun by @s0md3v ๐Ÿ›‘
It can check for thousands of GET params in under 50 requests! ๐Ÿคฏ

[1๏ธโƒฃ2๏ธโƒฃ] Wappalyzer
One last trick we'll give you is fingerprinting everything you find using @Wappalyzer ๐Ÿ‘‡
This way, you know what you're dealing with and what exploit might or might not work! ๐Ÿ’ช

๐Ÿงต And that's a wrap!

Note that there are alternatives to the tools we've showcased here, and looking around for something you like is highly recommended! ๐Ÿ›’

Be sure to like this tweet and follow @intigriti if you want more of these threads! ๐Ÿ’œ

Happy hacking! ๐Ÿ‘ฉโ€๐Ÿ’ป

Share this Scrolly Tale with your friends.

A Scrolly Tale is a new way to read Twitter threads with a more visually immersive experience.
Discover more beautiful Scrolly Tales like this.

Keep scrolling