Information Gathering

Is the process of collecting as much publically accessible information about a target/organization as possible to obtain a deeper vision of the objective and possibly find vulnerable entry points.

In this process we can find two primordial steps:

  • Reconnaissance: Preliminary survey to gather information about a target. It is done in two ways:

    • Passive: Rely on publicly available knowledge, and access from publicly available resources without directly engaging with the target. Some actions that involve this are:

      • Checking job ads related to the target website

      • Reading news articles about the target company

      • Search Engine Queries

      • WHOIS/DNS Lookups

      • Web Archive Analysis

      • Social Media Analysis

      • Code Repositories

    • Active: Requires direct engagement with the target. Some actions that involve this are:

      • Port Scanning

      • Vulnerability Scanning

      • Network Mapping

      • Service Enumeration

      • Banner Grabbing

      • OS Fingerprinting

      • Web Spidering

      • Social engineering

      • Physical access

  • Enumeration: Extracting as much system information as possible, such as valid usernames, machine names, network resources, share names, directory names, and others. Normally we scope this by some categories:

    • Open-Source Intelligence: Get as much public information as possible about the target

    • Infrastructure enumeration: Overview of the company's position on the internet and intranet. We use public services such as DNS to understand how the infrastructure is structured

    • Service Enumeration: Direct interaction with the assets, where we try to identify what version of a service is running, what information it provides us, and the reason it can be used

    • Host Enumeration: Identify the machines that are part of the infrastructure and the architecture they have internally, as well as the processes and services they run

Last updated