Penetration Testing: Passive Recon - eliminmax/cncs-journal GitHub Wiki
Penetration Testing: Passive Recon
The following tools and resources can be valuable for passive recon:
- Internet registration records, such as whois data, DNS records, TLS/SSL certifiates, etc.
- Archival websites (e.g. archive.org's Wayback Machine), search engine previews and cached content, etc.
- Social Media presence - particularly LinkedIn, as that tends to be all about the who's who of a target - useful for social engineering, and if they have an SQL database admin on their payroll, they're probably using SQL.
- Job listings, particularly management, C-Suite, IT - if they list Microsoft Office as a required skill, want people with experience with Active Directory, and so on, they just might be a Microsoft shop.