Make Your Recon Better Recon using automation If Your Beginner !

Greeting Everyone ! Hope Everything Is Going Good ! Today we Are Going to see How Easily You Can Perform Recon Against Your Targeted Domain We Are Going to Look Subdomains, Services , Server Info, Os Details, All Valid Url’s, All Wayback url, Google Hacking That we Are Going To cover In My firs Writeup On Recon Techniques this Guide For Who actually Started their Bugbounty Hunting .

This is my first writ-up on recon which we can utilize through some automation tool if your new in Bugbounty or web hacking field this blog may give you how you can start through subdomain finding to waybackurl & google hacking using google some interesting keyword.

Reconnaissance recon is a set of processes and techniques (Footprinting, Scanning & Enumeration) used to covertly discover and collect information about a target system. This phase help a tester to collect all possible Information About Target We have two Recon Phase ACTIVE Recon, PASSIVE Recon.

Let’s Start Your Recon Process:

Set Your Target In our case We will Set www.tesla.com As Recon

Look for Subdomains :

Tool : Subfinder, Sublis3r, subbrute

Usage Of Subfinder To utilize Your testing Phase Combo Two Tool Subfinder + httpx For Installation

Command:

subfinder -d tesla.com -silent -o domainsesla.txt | httpx -title -content-length -status-code -silent

As above command We See We combo two tool Subfinder + httpx We gathered All subdomains Inside Our Given File As We See We can Analyse Which Subdomain Is actually Active With their Response Code or Length Value .

Scan All Possible Services Port Against All Domain & Subdomain We collected Before :

Tool: Nmap, naabu, Rustscan

We Are going To utilize Our Recon Phase using Naabu : (Installation More Guide )Naabu is Good project Discovery Tool For Scan All Default Port Against Your Targeted Site.

Usage of Naabu:

naabu -iL domainlist.txt (List We According To Our Collected Subdomain Before)

To scan Against Specific Port → naabu -p 80,443,21–23 -iL domainlist.txt & Add Flag -top-ports 1000

As Above To run the naabu on a list of hosts, -iL option can be used we successfully Get result As we Got All Valid Open Port from targeted Domain’s List.

Discover Server Information Using nikto , wappalyzer

We Are going to Verify Server Information Using Wappalyzer tool: Wappalyzer (Installation https://www.wappalyzer.com/)is a technology profiler that shows you what websites are built with.

Usage: Its Extension Which Flexible With Browser Whenever You Will Serve Your Targeted Site You Will Get Server Info Or Many More when Your Browsing your Targeted site.

Nikto : Using Nikto Banner grab Server Info .

Usage Of Niko: nikto -h target

As above we see we Successfully verified Server Info about our target Now You can Go CVE according to server Version.

Look For Os Details:

tools We are using: Nmap, zenmap , Wappalyzer

Usage Of nmap: Nmap is networking Scanning tool which scan network infrastructure, services as OS fingerprint.

command: nmap -A target

As above scan we used -A for aggressive scan as we got running OS Details.

Look for all Valid Url’s:

Tool we will use: Gau, linkfinder, burp spider

Usage Of gau: getallurls (gau) fetches known URLs from AlienVault’s Open Threat Exchange, the Wayback Machine, and Common Crawl for any given domain.

Usage of gau: gau domain.com -o output.txt (save it in output file )

As above we fetch all url’s from respective domain which we saved as output file using -o .

Find all urls using waybackurl:

Tool we use: waybackurl

Usage Of Waybackurl: This is really a good tool for bugbounty hunter to fetch all url from wayback machine .

Command: cat domainstesla.txt | waybackurls

As above we already saved all subdomains of tesla using subfinder tool so we used that file domainstesla.txt

Now we have all wayback urls now You can grep to collect you interesting parameter or end point usage: grep -iE “redirect=”.

Google hacking Content discovery:

Utilize google hacking technique to find more bug it help us to find file , parameter, directory structure , critical data such password, ftp , sql info, database exposed.

Usage:

Find some interesting extension

Google Dork:

-site:target.com filetype:php

- site:target.com filetype:aspx

- site:target.com filetype:swf (Shockwave Flash)

-site:target.com filetype:wsdl

As we see we found all valid url which contain .php you can check like jsp, txt,pdf, doc, aspx

some google dorking keyword: https://gist.github.com/stevenswafford/393c6ec7b5375d5e8cdc

For Today that’s all I will Come with some interesting Topic on recon in next write up!

Hope You enjoyed ! Happy Hunting!

My twitter : https://twitter.com/@cyberTEACH2

My Youtube: https://www.youtube.com/channel/UCN5YKR8q7TObhymuftzvvkw

I am pallab jyotti borah From Assam ! I am Professionally VAPT Analyst as Part time Bugbounty hunter