Passive Gathering
These have a very low chance of detection as you are using publicly available resources and not directly targeting the organization.
- Search Engines / Google Dorking
- using specific queries to attempt to uncover information about a target
- WHOIS Lookups
- searching for domain registration information
- DNS
- identifying subdomains, mail servers, TXT records and other information about a domain
- Web Archive Analysis
- web archivers, like the wayback machine, scan and capture periodic snapshots of websites that can reveal information that may no longer be present
- Social Media Analysis
- Employee information or job listings can reveal information about technologies, hierarchy, phishing targets and other organization information
- Code Repositories
- GitHub and similar repos can have credentials or source code publicly available for finding vulnerabilities.
- Cloud Buckets
- Public Amazon AWS or Azure cloud repositories could have information that is unauthenticated and could be valuable
Footprinting
See [[Footprinting#Infrastructure Enumeration]] for detailed notes on gathering data for external infrastructure. See [[Footprinting#Host Based Enumeration]] for notes on gathering data via various services on a host.
Web Enumeration
see [[Information Gathering - Web]]
Exploits
- ExploitDB (
searchsploit), Rapid7 DB, Vulnerability Lab or Metasploit can help find exploits for particular applications