Intigriti Profile picture
Oct 18, 2022 โ€ข 14 tweets โ€ข 8 min read โ€ข Read on X
12 #recon tools you NEED to know about! ๐Ÿงต

Recon, the gathering of information about your target, is becoming more and more important! ๐Ÿง 

Here are the tools to help you spot subdomains, vhosts, S3 buckets, parameters and more faster and more effective than the others ๐Ÿ‘‡
[1๏ธโƒฃ] DNS
This DNS toolkit by @pdiscoveryio can do a lot! But let's focus on reverse DNS lookups ๐Ÿ‘€
Often, you have a huge list of IP addresses ๐Ÿ“œ
Just like resolving a domain to an IP, you can also try doing the opposite using PTR records!
Et voila! Domains to continue recon! ๐Ÿ‘‡
[2๏ธโƒฃ] Amass
This network mapping tool by @owasp is incredible, but let's hone in on doing subdomain enumeration. ๐Ÿ•ธ
The main domains companies use are often well-secured. But what about the domain that nobody knows about? Those can be riddled with bugs! ๐Ÿ›
Let's find them! ๐Ÿ‘‡
[3๏ธโƒฃ] @nmap
Nmap stands for "Network Mapper" and that's precisely what it does.
This 25-year-old tool is FAR from outdated!
Let's use Nmap to find out what's actually running on those endless machines you've enumerated so far! ๐Ÿ‘‡
[4๏ธโƒฃ] VHostScan
This Python scanner by @codingo_ is an excellent tool for finding virtual hosts! ๐Ÿ‘จโ€๐Ÿ’ป
What's that? Unlike subdomains, vhosts allow multiple applications to be hosted on a single server. ๐Ÿ–ฅ
This slightly esoteric feature means not many hunters are looking for this! ๐Ÿ”
[5๏ธโƒฃ] Httprobe
All this recon has given us many subdomains, but what now? ๐Ÿคทโ€โ™‚๏ธ
This tool by @TomNomNom will help us find all the web servers running on these subdomains! ๐Ÿ‘‡
[6๏ธโƒฃ] Waybackurls
Another tool by @TomNomNom can help us continue.
Instead of opting for active directory fuzzing, let's use the power of history to see what we can find on a target's website!
This tool uses the @waybackmachine to find new endpoints passively! ๐Ÿ‘‡
[7๏ธโƒฃ] S3enum
This Go tool by @koenrh automates AWS S3 bucket enumeration.
Using this tool, you may be able to find the next big misconfiguration or overly permissive S3 bucket! ๐Ÿ‘‡
[8๏ธโƒฃ] EyeWitness
If you're overwhelmed with endpoints, that's okay!
Let's bring some order to this madness using this tool by @FortyNorthSec ๐Ÿ’ช
It allows you to organize endpoints depending on their return value quickly. Screenshots of the page are a bonus! ๐Ÿ–ผ
[9๏ธโƒฃ] Relative URL extractor
JavaScript files are recon goldmines! They sometimes reference very interesting relative URLs that you need to know about! ๐Ÿง 
But manually going through 1000s of JS files, no! ๐Ÿช“
Use this great tool by @jobertabma ๐Ÿ‘‡
[1๏ธโƒฃ0๏ธโƒฃ] TruffleHog
If you're lucky, you may have found a git repository during your recon! ๐Ÿ€
Let's use this tool by @trufflesec to dig into it and uncover all secrets the repo has to hold! ๐Ÿ‘‡
[1๏ธโƒฃ1๏ธโƒฃ] Arjun
Let's talk about enumerating GET parameters!
If you were thinking of brute-forcing thousands of them, then check out Arjun by @s0md3v ๐Ÿ›‘
It can check for thousands of GET params in under 50 requests! ๐Ÿคฏ
[1๏ธโƒฃ2๏ธโƒฃ] Wappalyzer
One last trick we'll give you is fingerprinting everything you find using @Wappalyzer ๐Ÿ‘‡
This way, you know what you're dealing with and what exploit might or might not work! ๐Ÿ’ช
๐Ÿงต And that's a wrap!

Note that there are alternatives to the tools we've showcased here, and looking around for something you like is highly recommended! ๐Ÿ›’

Be sure to like this tweet and follow @intigriti if you want more of these threads! ๐Ÿ’œ

Happy hacking! ๐Ÿ‘ฉโ€๐Ÿ’ป

โ€ข โ€ข โ€ข

Missing some Tweet in this thread? You can try to force a refresh
ใ€€

Keep Current with Intigriti

Intigriti Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @intigriti

Sep 13
Want to master AWS S3 hacking? ๐Ÿค‘

This thread is for you! ๐Ÿงต ๐Ÿ‘‡ Image
AWS S3 (Simple Storage Service) buckets are a popular storage service often used by software companies to store data.

This is often sensitive data (such as receipts, invoices, etc.) but it can also be used to store public images such as profile pictures for example!
AWS S3 buckets are protected by Access Control Lists (ACLs), a set of rules that admins or developers declare to allow or disallow access

When these ACLs are incorrectly configured, they can open up access to unauthorized users

In this thread, we will cover a few commonly found security misconfigurations that can often lead to data leaks!
Read 9 tweets
Jul 5
This is the thread I wish someone created for me when I started participating in bug bounty! ๐Ÿ˜…

Not everyone shares these methods... but

Here are a few tips to help you identify & exploit more IDOR vulnerabilities! ๐Ÿค‘

๐Ÿงต ๐Ÿ‘‡
IDOR (insecure direct object reference) vulnerabilities are present in web services that directly reference a data object without proper access controls!

The data object can be anything, from sensitive fields that are stored in databases to files stored in a storage bucket.
Prefer a video instead? Watch our "IDOR In 100 seconds" explanation video on Youtube! ๐Ÿ‘‡

buff.ly/4cJjnpI
Read 9 tweets
Apr 12
Ever had to analyze JavaScript files using Burpsuite? ๐Ÿง

Here are 3 web extensions to help you out and find secrets, links and other sensitive data! ๐Ÿค‘

A thread ๐Ÿงต ๐Ÿ‘‡
1๏ธโƒฃ JS Miner

JS Miner is a Burpsuite Pro extension to help you analyze static files like JavaScript & JSON files found on your target for finding secrets, endpoints and other hard-coded sensitive data! ๐Ÿ˜Ž

Check it out on the Github! ๐Ÿ‘‡
buff.ly/3J9l6bl
2๏ธโƒฃ BurpSuite Secret Finder

Burpsuite Secret Finder is a tool capable of parsing all incoming HTTP responses for hardcoded secrets such as API keys & access tokens!

Secret Finder supports both Active & Passive scans!

Secret finder is available on Github!
buff.ly/4anMFJO
Read 5 tweets
Mar 1
Ever came across a subdomain on one of your targets that returned the following error? ๐Ÿง

If you ever skipped these, you may have missed out on a lot of bounties...

Here are the top 3 tools to bypass pages behind a 401 & 403 error status code! ๐Ÿค‘

A thread! ๐Ÿงต ๐Ÿ‘‡ Image
1๏ธโƒฃ bypass-url-parser

Bypass-url-parser is a fuzzer that performs all types of checks to attempt and bypass protected pages behind a 40X status code! ๐Ÿ˜Ž

It features several bypass modes including an option to spoof your IP!

Bypass-url-parser is Github:
buff.ly/42XeUfq
2๏ธโƒฃ Nomore403

Nomore403 is a Golang tool specifically designed to bypass pages behind a 403/40X status code! It features several bypasses including sending headers & HTTP methods to get access to protected pages! ๐Ÿค‘

Check it out on Github! ๐Ÿ‘‡
buff.ly/3P59cCx
Read 6 tweets
Nov 10, 2023
Look at this login form ๐Ÿ‘€

There are multiple vulnerabilities present. ๐Ÿค‘๏ธ But can you spot them all? ๐Ÿ˜Ž๏ธ

Let's cover each one of them! ๐Ÿงต๐Ÿ‘‡ Image
Imagine this...

You just performed subdomain enumeration

Filtered all live hosts and got a list of URLs. You know, the usual.

In them, you spot "staging-id\.example\.com" subdomain ๐Ÿ˜๏ธ

A quick look at the scope section, you see that this subdomain is in scope! ๐Ÿค‘๏ธ
And you decide to look for vulnerabilities

You opened the URL in your browser and found the following login form

And the first thing you tried... Image
Read 13 tweets
Sep 9, 2023
Top 4 tools to automate SQL Injection vulnerabilities!

A thread! ๐Ÿ‘‡ Image
1โƒฃ SQLMap

You probably already know about the first scanner...

SQLMap is the most popular SQL Injection vulnerability scanner out there and is fully open-source!

SQLMap is available on GitHub ๐Ÿ‘‡

github.com/sqlmapproject/โ€ฆ
2โƒฃ Ghauri

Ghauri is an advanced tool that helps you automate the detection and exploitation of SQL Injection vulnerabilities!

Ghauri is also open-source and available on GitHub!

github.com/r0oth3x49/ghauโ€ฆ
Read 6 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(