DIFFERENT METHODOLOGY
TO RECON TARGETS
CAT RELOADED
~$Eslam Akl
2020
$~:whoami 

eslam3kl

Penetration tester
CAT Reloaded Cyber Security member
Python script lover, Technical blogger and Vuln
machine attacker
Hunting & Penetration testing Steps.
Recon Types.
Before & After Recon.
Recon based on SCOPE.
Small Scope required information
Medium Scope required information
Large Scope required information
Recommended options.
Simple Methodology
Automation framework 3klcon v1.0
Practice on real target.
Juicy links and resources.
$~:Agenda
Hunting & Penetration testing Steps:
Recon / Information Gathering
Scanning
Vuln. Assessment
Post-Exploitation
Reporting
Recon Types:
1. Passive Recon
Collecting information about the target without any type
of interaction with it.
> Scan web application itself ! We don’t do that here D:
2. Active Recon
Scan the web application domain, subdomains,
acquisitions, servers, etc
> Actually, we do that here :)
Before Recon After Recon
Company name
Available scope
User credentials
to login (more
than account)
Overview about the
company business,
works and logic
Information from
program page
related to
security purposes
Subdomains
ASN&Acquisitions
Service info
Database info
Backend technology
used
Information
Exposure
Interesting
directories&
Endpoints
Juicy links which
may be vulnerable
More and more
Recon based SCOPE
Small Scope Target > domain or subdomain
Ex. target.com / support.target.com / api.target.com
Medium Scope Target > list of subdomains
Ex. *.target.com
Large Scope Target > All website related to the
company is in scope
Small Scope required information
! All processes here will be performed on specific subdomain
Directory enum.
GitHub Dorking
Server enum.
Database enum.
Google dorking for
sensitive files
Extract juicy
vulnerable links by
GF-Patterns
Waybackurls enum.
Parameter discovery
Automation vulnerability
scanning
JS file analysis
Backend enum.
WAF detection
GitHub search links
Port scan
Medium Scope required information
! All processes here will be performed on all subdomains
List of subdomains
Subdomains takeover
Misconfiguration in
Storage vuln (S3
buckets)
Directory enum.
GitHub Dorking
GitHub search links
Server enum.
Google dorking for
sensitive files
Database enum.
Waybackurls enum.
Parameter discovery
Automation vulnerability
scanning
JS file analysis
Backend enum.
Search Engine
discovery(Shodan, Spyse,
Censys, etc)
Port scan
WAF detection
Large Scope required information
! All processes here will be performed on all targets
Seeds/Roots
ASN to get IP ranges
Acquisitions
DNS & SSL enum.
List of subdomains
Subdomains takeover
Misconfiguration in
Storage vuln (S3
buckets)
Directory enum.
GitHub Dorking
GitHub search links
sensitive files
Waybackurls enum.
Parameter discovery
Automation vulnerability
scanning
JS file analysis
Backend enum.
Search Engine discovery
(Shodan, Spyse, Censys, etc)
Port scan
WAF detection
Database enum.
Server enum.
Google dorking for
Simple Methodology
Recommended options
Don’t perform all this steps MANUALLY!
Automate it <3
Let your remote machine discover
vulnerabilities while sleeping. VPS machines
via Amazon or Google
Stay in touch with new tools and technologies
to update your framework! Update it every week
<3
Use bash or python to script any process which
may take much time like using regex to extract
special pattern of data
3klcon v2.0 Automation Recon framework
Link: https://github.com/eslam3kl/3klCon
That’s enough !
Let’s
PRACTICE !!
GitHub Dorking
https://www.bugcrowd.com/resources/webinars/github-recon-and-
sensitive-data-exposure/
Js analysis
https://blog.appsecco.com/static-analysis-of-client-side-
javascript-for-pen-testers-and-bug-bounty-hunters-f1cb1a5d5288
Just another recon methodology from jhaddix
Just another Recon Guide for Pentesters and Bug Bounty Hunters |
Offensity
Bug bounty hunting methodology v4.0 from jhaddix (Recommended)
https://www.youtube.com/watch?v=p4JgIu1mceI
Active recon by using Nmap, Metasploit, etc
https://www.infopulse.com/blog/pentesters-training-and-practice-
recon-active-information-gathering-and-vulnerability-search/
Juicy references and resources.
Don’t forget !
Google
Is your friend <3
Thank you <3
Stay in Touch !
Medium Blog | GitHub | Twitter

Different Methodology To Recon Your Targets

  • 1.
    DIFFERENT METHODOLOGY TO RECONTARGETS CAT RELOADED ~$Eslam Akl 2020
  • 2.
    $~:whoami 
 eslam3kl
 Penetration tester CATReloaded Cyber Security member Python script lover, Technical blogger and Vuln machine attacker
  • 3.
    Hunting & Penetrationtesting Steps. Recon Types. Before & After Recon. Recon based on SCOPE. Small Scope required information Medium Scope required information Large Scope required information Recommended options. Simple Methodology Automation framework 3klcon v1.0 Practice on real target. Juicy links and resources. $~:Agenda
  • 4.
    Hunting & Penetrationtesting Steps: Recon / Information Gathering Scanning Vuln. Assessment Post-Exploitation Reporting
  • 5.
    Recon Types: 1. PassiveRecon Collecting information about the target without any type of interaction with it. > Scan web application itself ! We don’t do that here D: 2. Active Recon Scan the web application domain, subdomains, acquisitions, servers, etc > Actually, we do that here :)
  • 6.
    Before Recon AfterRecon Company name Available scope User credentials to login (more than account) Overview about the company business, works and logic Information from program page related to security purposes Subdomains ASN&Acquisitions Service info Database info Backend technology used Information Exposure Interesting directories& Endpoints Juicy links which may be vulnerable More and more
  • 7.
    Recon based SCOPE SmallScope Target > domain or subdomain Ex. target.com / support.target.com / api.target.com Medium Scope Target > list of subdomains Ex. *.target.com Large Scope Target > All website related to the company is in scope
  • 8.
    Small Scope requiredinformation ! All processes here will be performed on specific subdomain Directory enum. GitHub Dorking Server enum. Database enum. Google dorking for sensitive files Extract juicy vulnerable links by GF-Patterns Waybackurls enum. Parameter discovery Automation vulnerability scanning JS file analysis Backend enum. WAF detection GitHub search links Port scan
  • 9.
    Medium Scope requiredinformation ! All processes here will be performed on all subdomains List of subdomains Subdomains takeover Misconfiguration in Storage vuln (S3 buckets) Directory enum. GitHub Dorking GitHub search links Server enum. Google dorking for sensitive files Database enum. Waybackurls enum. Parameter discovery Automation vulnerability scanning JS file analysis Backend enum. Search Engine discovery(Shodan, Spyse, Censys, etc) Port scan WAF detection
  • 10.
    Large Scope requiredinformation ! All processes here will be performed on all targets Seeds/Roots ASN to get IP ranges Acquisitions DNS & SSL enum. List of subdomains Subdomains takeover Misconfiguration in Storage vuln (S3 buckets) Directory enum. GitHub Dorking GitHub search links sensitive files Waybackurls enum. Parameter discovery Automation vulnerability scanning JS file analysis Backend enum. Search Engine discovery (Shodan, Spyse, Censys, etc) Port scan WAF detection Database enum. Server enum. Google dorking for
  • 11.
  • 12.
    Recommended options Don’t performall this steps MANUALLY! Automate it <3 Let your remote machine discover vulnerabilities while sleeping. VPS machines via Amazon or Google Stay in touch with new tools and technologies to update your framework! Update it every week <3 Use bash or python to script any process which may take much time like using regex to extract special pattern of data
  • 13.
    3klcon v2.0 AutomationRecon framework Link: https://github.com/eslam3kl/3klCon
  • 14.
  • 15.
    GitHub Dorking https://www.bugcrowd.com/resources/webinars/github-recon-and- sensitive-data-exposure/ Js analysis https://blog.appsecco.com/static-analysis-of-client-side- javascript-for-pen-testers-and-bug-bounty-hunters-f1cb1a5d5288 Justanother recon methodology from jhaddix Just another Recon Guide for Pentesters and Bug Bounty Hunters | Offensity Bug bounty hunting methodology v4.0 from jhaddix (Recommended) https://www.youtube.com/watch?v=p4JgIu1mceI Active recon by using Nmap, Metasploit, etc https://www.infopulse.com/blog/pentesters-training-and-practice- recon-active-information-gathering-and-vulnerability-search/ Juicy references and resources.
  • 16.
  • 17.
    Thank you <3 Stayin Touch ! Medium Blog | GitHub | Twitter