Passive Reconnaissance


  Kali Username: cisco    Password: cisco

Exercise 1a

Let’s do a quick refresher using the Recon-NG tool and perform a quick recon on h4cker.org. This exercise will be a guided exercise, but then you will perform reconnaissance of an organization called SecretCorp (secretcorp.org).

Note: Omar Santos owns secretcorp.org and this is not a real company. However, you will use it to practice your skills. Based on the information about that company you will find out more information about the different targets you will interact with in the labs for the next two days.

The D and the K in the last two columns of the table shown above indicate that the module has dependencies or that it requires an API key.

Search again for dns. Notice that this is simply a keyword search– there are tools (e.g. Netcraft) that use DNS, and don’t show up in the results.

Netcraft

Next, load netcraft by running modules load recon/domains-hosts/netcraft. Run info to see the module information and options.

NOTE: You are NOT hacking anyone here, the tool is just using public DNS records to perform these actions.

Did you get any results? If not, why do you think this is the case? Sometimes these tools are not reliable. As an ethical hacker, it’s imperative not to become overly reliant on any single tool or set of tools for security assessments and penetration testing. Hacking, at its core, is about adopting the methodology and mindset of an attacker, which requires a deep understanding of the underlying principles of cybersecurity, the intricacies of network architectures, and the vulnerabilities that can be exploited. Tools, while invaluable for efficiency and automating certain tasks, can sometimes obscure the broader picture, limiting one’s ability to think creatively and adaptively about potential security threats.

A tool-centric approach may lead to a false sense of security, as these tools can only identify vulnerabilities they are programmed to find, potentially missing novel or complex attack vectors. Additionally, reliance on tools can hinder the development of critical problem-solving skills and the intuitive understanding needed to anticipate and counteract sophisticated cyber threats. Ethical hackers should use tools as aids, not crutches, complementing their technical acumen with a strategic mindset that prioritizes comprehensive security assessments over the convenience of automated scans. This balanced approach, combining deep technical knowledge with a broad strategic perspective, is essential for identifying and mitigating the full spectrum of cybersecurity threats.

bing_domain_web

Did you find anything interesting?

Exercise 1b: Certificate Transparency

Certificate Transparency (CT) is a security standard and set of protocols that aims to increase transparency and accountability in the digital certificate issuance process. It is designed to make it more difficult for attackers to obtain fraudulent certificates for domain names, and to make it easier to detect and revoke such certificates if they are issued. This is achieved by creating a public, append-only log of all digital certificates issued by a certificate authority (CA), which can be audited by anyone. CT logs are used to verify that a certificate was properly issued by a CA and has not been revoked.

CT can be used for passive reconnaissance and OSINT. There are several websites that provide information and tools related to certificate transparency:

These are just a few examples of websites that provide information and tools related to certificate transparency.

Go to https://crt.sh and try to find additional hosts in the secretcorp.org domain. Alternatively, you can also use Recon-ng to pull the same data using the certificate_transparency module.

Exercise 2: Recon of SecretCorp

Use the tools you just practiced to perform detailed passive reconnaissance of SecretCorp.org. Find as many of the following as you can:

© Copyright Cisco Systems