RECON
By
Yash Goti
V1.0 [Basic]
recon is <3
Introduction
• Yash Goti
• Cyber Security Analyst
• Semi Developer
• Twitter : _YashGoti_
• LinkedIn : yashgoti
Agenda
• What is recon?
• What is recon-lit?
• Staging of recon
• Q & A
What is recon?
• Recon is an important step in exploring a target to grab a publicly
available information which is useful for further in pen testing.
• It also plays a key role in penetration testing as well as in red
teaming.
What is recon-lit?
• How this idea comes?
• Just an updated version of sublist3r.
• It scrap or find subdomains of domains from many search engines
archives.
• Then check the alive subdomains from them.
• Then follow redirection from that subdomain.
• Scan basic port scan along with service name.
Stage of recon [Web]
• First set your target
• Enumerate subdomains
• Enumerate Technologies
• Enumerate Directories
• Finding Endpoints
• Finding Hidden Parameters
• Find Open Ports
• Start Testing
Status
• We have target [*.paypal.com]
Subdomain discovery
• There are so many tools that can enumerate subdomains.
• From many sources you can find subdomains.
Tools for enumerate subdomains
Tools
• Sublist3r
• Recon-lit
• Aquatone
• Amass
• Findomains
Websites
• Crt.sh
• Findsubdomains.com
• Dnsdumpster.com
• Searchdns.netcraft.com
Status
• Subdomains [from recon-lit] : 2326
python3 reconlit.py -d demo.paypal.com
• Target : demo.paypal.com
Now what?
• Take screenshot of every subdomains
• Identify technologies were used by target
• Finding endpoints
Identify technologies
• Wappalyzer
• Built-with
• what’s-run
• Google & Mozilla extensions
Enumeration directories
• Dirb
• Dirbuster
• Dirsearch
• Gobuster
Status
• Dirb
dirb https://demo.paypal.com
• Dirsearch
python3 dirsearch.py -u https://demo.paypal.com -e *
Finding endpoints and hidden parameters
• Linkfinder
• Parameth
Find open ports
• Nmap
• Masscan
• AutoNSE
• Shodan
• Nessus – Pro
• Nikto
• OpenVAS
Status
• Nmap
nmap -Pn -v3 -p- -sV -sT -sU -O -A -T4 demo.paypal.com --script=* --
script-args "shodan-api.key=<SHODAN API KEY>" -e eth0
• AutoNSE
./autonse.sh
n
demo.paypal.com
Finally
• Here is what I got
• Source code download
• Developer sandbox creds
• 7 different accounts creds
• and many more.
Q & A
Thank You

Tool presentation - Recon-Lit

  • 1.
  • 2.
    Introduction • Yash Goti •Cyber Security Analyst • Semi Developer • Twitter : _YashGoti_ • LinkedIn : yashgoti
  • 3.
    Agenda • What isrecon? • What is recon-lit? • Staging of recon • Q & A
  • 4.
    What is recon? •Recon is an important step in exploring a target to grab a publicly available information which is useful for further in pen testing. • It also plays a key role in penetration testing as well as in red teaming.
  • 5.
    What is recon-lit? •How this idea comes? • Just an updated version of sublist3r. • It scrap or find subdomains of domains from many search engines archives. • Then check the alive subdomains from them. • Then follow redirection from that subdomain. • Scan basic port scan along with service name.
  • 6.
    Stage of recon[Web] • First set your target • Enumerate subdomains • Enumerate Technologies • Enumerate Directories • Finding Endpoints • Finding Hidden Parameters • Find Open Ports • Start Testing
  • 7.
    Status • We havetarget [*.paypal.com]
  • 8.
    Subdomain discovery • Thereare so many tools that can enumerate subdomains. • From many sources you can find subdomains.
  • 9.
    Tools for enumeratesubdomains Tools • Sublist3r • Recon-lit • Aquatone • Amass • Findomains Websites • Crt.sh • Findsubdomains.com • Dnsdumpster.com • Searchdns.netcraft.com
  • 10.
    Status • Subdomains [fromrecon-lit] : 2326 python3 reconlit.py -d demo.paypal.com • Target : demo.paypal.com
  • 11.
    Now what? • Takescreenshot of every subdomains • Identify technologies were used by target • Finding endpoints
  • 12.
    Identify technologies • Wappalyzer •Built-with • what’s-run • Google & Mozilla extensions
  • 13.
    Enumeration directories • Dirb •Dirbuster • Dirsearch • Gobuster
  • 14.
    Status • Dirb dirb https://demo.paypal.com •Dirsearch python3 dirsearch.py -u https://demo.paypal.com -e *
  • 15.
    Finding endpoints andhidden parameters • Linkfinder • Parameth
  • 16.
    Find open ports •Nmap • Masscan • AutoNSE • Shodan • Nessus – Pro • Nikto • OpenVAS
  • 17.
    Status • Nmap nmap -Pn-v3 -p- -sV -sT -sU -O -A -T4 demo.paypal.com --script=* -- script-args "shodan-api.key=<SHODAN API KEY>" -e eth0 • AutoNSE ./autonse.sh n demo.paypal.com
  • 18.
    Finally • Here iswhat I got • Source code download • Developer sandbox creds • 7 different accounts creds • and many more.
  • 19.