🥷
Red
search
⌘Ctrlk
🥷
Red
  • 🟥Overview
  • 📚Education
  • Setup
  • â­•Attacker Lifecycle
    • Steps
      • Engagement
      • 🔬Recon
        • OSINT
        • Active Recon / footprinting
      • 👀Initial Access
      • 🧞Privilege Escalation
      • Data Exfil
      • Reporting
  • Bug Bounty
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. â­•Attacker Lifecyclechevron-right
  2. Stepschevron-right
  3. 🔬Recon

OSINT

Passive Recon aka information gathering

LogoICANN Lookuplookup.icann.orgchevron-right
LogoInternet Archive: Digital Library of Free & Borrowable Texts, Movies, Music & Wayback Machinearchive.orgchevron-right
http://shodan.ioshodan.iochevron-right
LogoDNSDumpster - Find & lookup dns records for recon & researchDNSDumpster.comchevron-right
LogoMITRE ATT&CK®attack.mitre.orgchevron-right
LogoURL and website scanner - urlscan.iourlscan.iochevron-right
LogoOffSec’s Exploit Database Archivewww.exploit-db.comchevron-right
PreviousReconchevron-leftNextActive Recon / footprintingchevron-right

Last updated 2 years ago