Recon like a pro

- Jaimin Gohel

About Speaker

  • MCA(GLSICT)
  • Bug hunter
  • Developer @Qloo IT Solutions

What is Reconnaissance?

Five Phases of a Pentest

  • Phase 1 | Reconnaissance
    • Active (touching) or passive (indirect) data gathering on target
  • Phase 2 | Scanning
    • Manual and automatic tools used to learn more about the infrastructure
  • Phase 3 | Gaining Access
    • Taking control, extracting data, pivoting to attack other targets.
  • Phase 4 | Maintaining Access
    • Persist, remain stealthy / don’t get caught and extract as much data as possible
  • Phase 5 | Covering Tracks
    • Any changes, authorizations, etc. all must return to a state of non-recognition.

Types of Reconnaissance

  • Passive reconnaissance

    • DNS information

    • Sniffing through regular traffic

    • WHOIS database

  • Active reconnaissance

    • OS scans
    • Port scans
    • Discover running services
    • Programming languages used

Methods of Reconnaissance

  • Recon through search engines
  • DNS footprinting
  • WHOIS lookup
  • Through social networking sites/ people search services
  • Advanced google hacking techniques
  • Find services used by target host
  • Website recon

Recon through search engines (Shodan.io)

Recon through search engines (Shodan.io)

DNS footprinting (http://ping.eu/nslookup/)

WHOIS lookup

  • Domain name details
  • Contact details of domain owner
  • Domain name server
  • When a domain has been created
  • Expiry records

WHOIS lookup (https://who.is)

WHOIS lookup (https://who.is) cont.

Through social networking sites/ people search services

  • Social networking sites are great source of personal and organizational information
  • Information about an individual can be found at various people search websites
  • Eg. Linkedin.com, pipl.com

Social site (https://pipl.com)

Advanced google hacking techniques

  • Google hacking refers to creating complex search queries in order to extract sensitive hidden information
  • It helps attacker to find possible vulnerable targets
  • It used advanced google search operators to locate specific strings of text within the search result

Advanced google hacking techniques

  • intitle:
    • intitle:Admin login
  • intext:
    • intext:email
  • inurl:
    • inurl:view/view.php
  • site:
    • site:example.com

Advanced google hacking techniques

  • site:example.com ext:xml | ext:conf | ext:cnf | ext:reg | ext:inf | ext:rdp | ext:cfg | ext:txt | ext:ora | ext:ini
  • site:example.com ext:sql | ext:dbf | ext:mdb
  • site:example.com ext:bkf | ext:bkp | ext:bak | ext:old | ext:backup
  • site:example.com intext:"sql syntax near" | intext:"syntax error has occurred" | intext:"incorrect syntax near"

Advanced google hacking techniques

Find services used by target host

Namp example

Website recon

  • Web data extractors
    • httrack
  • Wayback machine
    • archive.org
  • Examine html source code
  • subdomain finder
    • sublister, knockpy

Web data extractors(httrack)

Wayback machine(https://archive.org)

Subdomain scanning (Sublist3r)

Questions?

Recon like a pro

By Jaimin Gohel

Recon like a pro

Recon like a pro by Jaimin Gohel

  • 960