In a more general context, recon can refer to any effort to gather information or understand a situation better. For example, doing recon before a meeting might involve researching the participants and topics to be discussed. Reconnaissance is always the initial step in a cyber attack. An attacker must first gather information about the target in order to be successful. there are two type reconnaissance. Active and passive .in one word if we say that what is active and passive recon? Active recon means is a method of information gathering in which the tools interact directly with the target device or network and passive recon is a method of information gathering in which the tools do not interact directly with the target device or network.
- Host enumeration
- Network enumeration
- User enumeration
- Group enumeration
- Network share enumeration
- Web page enumeration
- Application enumeration
- Service enumeration
- Packet crafting
Common passive reconnaissance tools and methods include the following:
- Domain enumeration
- Packet inspection
- Open-source intelligence (OSINT)
- Recon-ng
- Eavesdropping
1.User enumeration: User enumeration is a technique used by attackers to identify valid usernames within a system. By systematically probing a target, malicious actors can gather information about existing users, which can then be leveraged for further attacks. This process often involves submitting various username combinations and analyzing the system's responses to determine which usernames are valid. For example, if a login form responds differently to an invalid username versus an invalid password, attackers can infer which usernames are valid. Another method involves analyzing server response times, where valid usernames might result in quicker responses compared to invalid ones.
2.Group enumeration: Group enumeration involves identifying and listing groups within a system, typically in the context of network security or Active Directory environments. This process helps administrators and security professionals understand the structure and membership of groups, which is crucial for managing permissions and access controls.
3.Network share enumeration: Network share enumeration involves identifying and listing shared resources, such as folders and drives, within a network. This process is crucial for both offensive and defensive security measures.
4.Packet crafting: Packet crafting is a technique used to manually create or modify network packets to test network devices, firewalls, and other components. This process is essential for network administrators and security professionals to understand network behavior, identify vulnerabilities, and ensure robust security measures.
5.Packet inspection: Packet inspection is a technique used to analyze network packets as they pass through a network device, such as a router, firewall, or intrusion detection system (IDS). The primary goal of packet inspection is to examine the contents of packets to detect and mitigate security threats, ensure compliance with policies, and optimize network performance.
6.Eavesdropping: Eavesdropping is the act of secretly listening to private conversations or communications without the consent of the parties involved. In the context of cybersecurity, eavesdropping refers to intercepting and monitoring network traffic to gain unauthorized access to sensitive information.
Now we have a general idea of recon methods. let's div into the process. first of all we start with passive recon.
Passive Reconnaissance:
1.SpiderFoot is an automated OSINT scanner. It is included with Kali. SpiderFoot queries over 1000 open-information sources and presents the results in an easy-to-use GUI. SpiderFoot can also be run from a console. SpiderFoot seeds its scan with one of the following:
- Domain names
- IP addresses
- Subnet addresses
- Autonomous System Numbers (ASN)
- Email addresses
- Phone numbers
- Personal names
check exiftool, emailharvester , h8mail for password dump and retrive the organization email address. For more information gathering tools recon-ng, wayback , shodan.
2. dig: dig is another command base tools that is very useful for providing details information about dns.
6.h8mail: this is very powerful tools for email OSINT and password breach tools. here you can see that it's find out the mail address that was in the website and also check that it has been facke or not and password dump or not.
if you want to check only the email address that it is ok or not. just use -t insteat of -u and email address.
example.com) has been recently queried by users of a DNS server. The snooping process helps determine whether the domain's information is present in the DNS cache of the nameserver. it's take may some time . so let's the next..jpeg)






















0 Comments
Thanks For your comment