Pentesting Tools: OSINT - Paiet/SEC-335 GitHub Wiki
- OSINT (Open Source Intelligence)
- Nslookup
- Performing name lookup
- 2 modes
- Non-Interactive
nslookup www.nicholas.com
- Interactive
set type=
- Whois
whois -H microsoft.com
- Gather some good intel
- Technical contacts
- Phone/Fax numbers
- Email
- FOCA
- Theharvester
- Gathers target info
- Subdomain names
- Employee names
- Email Addresses
- PGP keys
- Open ports and service banners
-
/usr/bin/theharvester
gets the help
theharvester -d nicholas.com -l 500 -b all
- Recon-NG
- Gathers target info
- Subdomain names
- Employee names
- Email Addresses
- PGP keys
- etc
recon-ng
workspace add <name>
add domain <domain name>
show modules
-
search domain-
(look for domain based modules)
use module recon/domains-hosts/bing_domain_web
show info
run
- Maltego
- Information Collection
- Visual graphing
- Walk through interface
- Shodan
- Finds specific devices
- Routers
- Switches
- Computers/Servers
- IoT
- ICS
- search for: title:"hacked by"
- Censys
⚠️ **GitHub.com Fallback** ⚠️