🥷
Red
search
⌘Ctrlk
🥷
Red
  • 🟥Overview
  • â­•Attacker Lifecycle
    • Steps
      • 📰Pre-Engagement
      • Engagement
      • 🔬Information Gathering
        • OSINT
        • Infrastructure Enumeration
        • Host Enumeration
        • Service Enumeration
      • Pillaging
      • 👀Vulnerability Assessment
      • Exploitation
      • Post-Exploitation
      • Lateral Movement
      • Proof-of-Concept
      • Post-Engagement
  • 📚Education
  • Bug Bounty
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. â­•Attacker Lifecyclechevron-right
  2. Stepschevron-right
  3. 🔬Information Gathering

OSINT

Passive Recon aka information gathering

LogoICANN Lookuplookup.icann.orgchevron-right
LogoInternet Archive: Digital Library of Free & Borrowable Texts, Movies, Music & Wayback Machinearchive.orgchevron-right
http://shodan.ioshodan.iochevron-right
LogoDNSDumpster - Find & lookup dns records for recon & researchDNSDumpster.comchevron-right
LogoMITRE ATT&CK®attack.mitre.orgchevron-right
LogoURL and website scanner - urlscan.iourlscan.iochevron-right
LogoOffSec’s Exploit Database Archivewww.exploit-db.comchevron-right

hashtag
Google Dork

public passwords

ssh keys

PreviousInformation Gatheringchevron-leftNextInfrastructure Enumerationchevron-right

Last updated 7 hours ago