Intigriti Profile picture
Oct 18, 2022 β€’ 14 tweets β€’ 8 min read β€’ Read on X
12 #recon tools you NEED to know about! 🧡

Recon, the gathering of information about your target, is becoming more and more important! 🧠

Here are the tools to help you spot subdomains, vhosts, S3 buckets, parameters and more faster and more effective than the others πŸ‘‡
[1️⃣] DNS
This DNS toolkit by @pdiscoveryio can do a lot! But let's focus on reverse DNS lookups πŸ‘€
Often, you have a huge list of IP addresses πŸ“œ
Just like resolving a domain to an IP, you can also try doing the opposite using PTR records!
Et voila! Domains to continue recon! πŸ‘‡
[2️⃣] Amass
This network mapping tool by @owasp is incredible, but let's hone in on doing subdomain enumeration. πŸ•Έ
The main domains companies use are often well-secured. But what about the domain that nobody knows about? Those can be riddled with bugs! πŸ›
Let's find them! πŸ‘‡
[3️⃣] @nmap
Nmap stands for "Network Mapper" and that's precisely what it does.
This 25-year-old tool is FAR from outdated!
Let's use Nmap to find out what's actually running on those endless machines you've enumerated so far! πŸ‘‡
[4️⃣] VHostScan
This Python scanner by @codingo_ is an excellent tool for finding virtual hosts! πŸ‘¨β€πŸ’»
What's that? Unlike subdomains, vhosts allow multiple applications to be hosted on a single server. πŸ–₯
This slightly esoteric feature means not many hunters are looking for this! πŸ”
[5️⃣] Httprobe
All this recon has given us many subdomains, but what now? πŸ€·β€β™‚οΈ
This tool by @TomNomNom will help us find all the web servers running on these subdomains! πŸ‘‡
[6️⃣] Waybackurls
Another tool by @TomNomNom can help us continue.
Instead of opting for active directory fuzzing, let's use the power of history to see what we can find on a target's website!
This tool uses the @waybackmachine to find new endpoints passively! πŸ‘‡
[7️⃣] S3enum
This Go tool by @koenrh automates AWS S3 bucket enumeration.
Using this tool, you may be able to find the next big misconfiguration or overly permissive S3 bucket! πŸ‘‡
[8️⃣] EyeWitness
If you're overwhelmed with endpoints, that's okay!
Let's bring some order to this madness using this tool by @FortyNorthSec πŸ’ͺ
It allows you to organize endpoints depending on their return value quickly. Screenshots of the page are a bonus! πŸ–Ό
[9️⃣] Relative URL extractor
JavaScript files are recon goldmines! They sometimes reference very interesting relative URLs that you need to know about! 🧠
But manually going through 1000s of JS files, no! πŸͺ“
Use this great tool by @jobertabma πŸ‘‡
[1️⃣0️⃣] TruffleHog
If you're lucky, you may have found a git repository during your recon! πŸ€
Let's use this tool by @trufflesec to dig into it and uncover all secrets the repo has to hold! πŸ‘‡
[1️⃣1️⃣] Arjun
Let's talk about enumerating GET parameters!
If you were thinking of brute-forcing thousands of them, then check out Arjun by @s0md3v πŸ›‘
It can check for thousands of GET params in under 50 requests! 🀯
[1️⃣2️⃣] Wappalyzer
One last trick we'll give you is fingerprinting everything you find using @Wappalyzer πŸ‘‡
This way, you know what you're dealing with and what exploit might or might not work! πŸ’ͺ
🧡 And that's a wrap!

Note that there are alternatives to the tools we've showcased here, and looking around for something you like is highly recommended! πŸ›’

Be sure to like this tweet and follow @intigriti if you want more of these threads! πŸ’œ

Happy hacking! πŸ‘©β€πŸ’»

β€’ β€’ β€’

Missing some Tweet in this thread? You can try to force a refresh
γ€€

Keep Current with Intigriti

Intigriti Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @intigriti

Mar 6
List of most loved open-source web hacking tools we featured on Intigriti! πŸ€‘

A thread! πŸ§΅πŸ‘‡ Image
1️⃣ Malicious PDF Generator

Malicious PDF Generator is an open-source toolkit that lets you generate tens of malicious PDF files to exploit various vulnerabilities and insecure features in PDF readers! 🀠

πŸ”— github.com/jonaslejon/mal…Image
2️⃣ Hakoriginfinder

Hakoriginfinder by @hakluke is a simple tool to quickly identify the origin hosts of targets behind Cloudflare, AWS, and other types of reverse proxies! 🀠

πŸ”— github.com/hakluke/hakori…
Read 9 tweets
Jan 30
Most hackers limit themselves to only using proxy interceptor, repeater, and intruder... 🀠

But these 8 unpopular Burp Suite features can save you hours of testing time (and find you more vulnerabilities)! πŸ€‘

A thread! πŸ§΅πŸ‘‡ Image
1️⃣ Macros

Burp Suite provides built-in macro support that helps automate repetitive tasks such as refreshing authentication tokens and retrieving anti-CSRF tokens for each new request.

For instance, if you're testing an application that revokes anti-CSRF tokens with each new HTTP request, you can quickly set up a macro to automatically obtain a new CSRF token before sending a new request in Repeater or Intruder, preventing you from having to manually update the token every time.Image
2️⃣ Match & replace Rules

Burp Suite's Match & Replace feature allows you to automatically modify any intercepted HTTP requests and responses, eliminating the need to manually edit each request when testing specific payloads or bypassing certain security controls. Image
Read 12 tweets
Jul 4, 2025
Do you want to find more vulnerabilities with recon? πŸ€‘

Open this thread (step-by-step guide)! 🧡 πŸ‘‡ Image
Before we dive in, let's first cover what recon (short for 'reconnaissance') is.

Recon is the first crucial phase of any engagement and it involves mapping out (sub)domains, IP ranges, technologies and services, as well as any other publicly accessible information through several techniques
Bug bounty hunters who spend time performing reconnaissance, are almost always rewarded well for their efforts as they often come across exposed assets or hosts that have never been tested before πŸ€‘

Let's now dive deeper into how you can find these untested assets to find more vulnerabilities! πŸ‘‡
Read 11 tweets
May 30, 2025
12 API hacking bug bounty tips you must try on your target! 😎

🧡 πŸ‘‡ Image
1️⃣ Blind XSS via request headers

Applications log your data in various ways, including in insecure ways. Always test for blind XSS vulnerabilities by injecting your payload in common request headers, such as:
β€’ Referrer
β€’ X-Forwarded-For, X-Forwarded-Host, X-Forwarded-Ip, Host (in case of a reverse proxy)
β€’ User-Agent
β€’ Etc.

Dive deeper into blind XSS:
intigriti.com/researchers/bl…Image
2️⃣ Legacy API endpoints

Are your request paths prefixed with an "/api/v2"? Try testing legacy endpoints by:
β€’ Replacing "/api/v2" with "/api/v1"
β€’ Removing "/v2" altogether

Try similarly in case it's a subdomain: api-v2\.example\.com β†’ api-v1\.example\.com or api\.example\.com
Read 14 tweets
Mar 14, 2025
Master exploiting XXE vulnerabilities! 😎

A thread 🧡 πŸ‘‡ Image
XML eXternal Entity (XXE) injection is a vulnerability class that stems from inadequate user input validation during XML parsing, allowing attackers to take advantage of parser misconfigurations!

This often leads to local file read, server-side request forgery, and, in severe cases, even remote code execution!
However, XXE vulnerabilities are much harder to spot nowadays.

You must pay close attention to application components that might accept and process XML data, such as:

β€’ Document converters (Word/Excel)
β€’ SVG file processors
β€’ RSS/Atom feed processors
β€’ Importing features (accepting XML data)
Read 15 tweets
Feb 15, 2025
Master hacking WordPress targets in one thread! πŸ€‘

🧡 πŸ‘‡ Image
We've all come across a WordPress instance before...

It's a powerful content management system (CMS) that can be deployed for all sorts of use cases, from landing pages to blogs and e-commerce sites!
WordPress also provides support for plugins and themes allowing developers to further extend the CMS's capabilities!

Luckily for us, not every WordPress target deserves the same security attention, allowing security vulnerabilities to easily arise unnoticed!
Read 14 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(