Information Gathering
Last updated
Was this helpful?
Last updated
Was this helpful?
Is the process of collecting as much publically accessible information about a target/organization as possible to obtain a deeper vision of the objective and possibly find vulnerable entry points.
In this process we can find two primordial steps:
Reconnaissance: Preliminary survey to gather information about a target. It is done in two ways:
Passive: Rely on publicly available knowledge, and access from publicly available resources without directly engaging with the target. Some actions that involve this are:
Looking up DNS records of a domain from a public DNS server
Checking job ads related to the target website
Reading news articles about the target company
Active: Requires direct engagement with the target. Some actions that involve this are:
Connecting to one of the company servers such as HTTP, FTP, and SMTP
Calling the company in an attempt to get information (social engineering)
Enter to physical centers of the target company
Enumeration: Extracting as much system information as possible, such as valid usernames, machine names, network resources, share names, directory names, and others. Normally we scope this by some categories:
Open-Source Intelligence: Get as much public information as possible about the target
Infrastructure enumeration: Overview of the company's position on the internet and intranet. We use public services such as DNS to understand how the infrastructure is structured
Service Enumeration: Direct interaction with the assets, where we try to identify what version of a service is running, what information it provides us, and the reason it can be used
Host Enumeration: Identify the machines that are part of the infrastructure and the architecture they have internally, as well as the processes and services they run