Look Mom, No Packets!
During the reconnaissance phase of a penetration test being able to discover the external assets of an organization is extremely important. It is also important to do so as stealthily as possible. Using open-source tools and techniques it is possible to enumerate an organizations external assets without sending any packets directly from your computer system to the target organization’s network. In this episode of Tradecraft Security Weekly Beau Bullock (@dafthack) shows you how to use Recon-NG, Datasploit, Shodan and more!.
- Certificate Search Tool – crt.sh
- Internet-Wide Scan Data Repository