๐Ÿฅท
Red
CtrlK
  • ๐ŸŸฅOverview
  • ๐Ÿ“šEducation
    • ๐ŸงGuides
    • ๐Ÿ‹๏ธTraining
    • ๐Ÿ“•Books
    • ๐ŸฅณConventions
    • ๐Ÿ“ฐNews
    • ๐Ÿ—๏ธPhysical Tools
    • ๐Ÿ—ฃ๏ธPodcasts
    • ๐Ÿ“นYT Channels
  • Setup
    • ctf setup
    • Exploitation Frameworks
    • Learning Offense
    • rando
  • โญ•Attacker Lifecycle
    • Steps
      • Engagement
      • ๐Ÿ”ฌRecon
        • OSINT
        • Active Recon / footprinting
      • ๐Ÿ‘€Initial Access
        • Exploit
          • SMB
        • Internal Recon
        • Linux Custom Enum Script
        • enumerate Script
        • Windows Privilege Escalation
      • ๐ŸงžPrivilege Escalation
        • Ways To Privelege Escalate
      • Data Exfil
        • Data Exfil 1
      • Reporting
  • Bug Bounty
    • Bug Bounty Sites
    • OWASP Top 10
      • Injection
      • Broken Authentication
      • Sensitive Data Exposure
      • XML External Entities (XXE)
      • Broken Access Control
      • Security Misconfigurations
      • Cross-Site Scripting (XSS)
      • Insecure Deserialization
      • Using Components with Known Vulnerabilities
      • Insufficient Logging and Monitoring
Powered by GitBook
On this page
  1. โญ•Attacker Lifecycle
  2. Steps
  3. ๐Ÿ”ฌRecon

OSINT

Passive Recon aka information gathering

LogoICANN Lookup
LogoInternet Archive: Digital Library of Free & Borrowable Books, Movies, Music & Wayback Machine
LogoShodanShodan
https://dnsdumpster.com/dnsdumpster.com
LogoMITRE ATT&CKยฎ
LogoURL and website scanner - urlscan.io
LogoOffensive Securityโ€™s Exploit Database Archive
PreviousReconNextActive Recon / footprinting

Last updated 2 years ago