Recon Automation Using OSINT
Recon Automation Using OSINT
documents that are available online. freegeoIP API. Upon passing the IP address, this API
Example: returns the physical location of the host pertaining to the
Dork: intext:(password | passcode) intext:(username| IP address in json format.
userid| user) insite:www.target.com This dork Physical location can also be obtained by using
provides results with pages that contain keywords GeoCoding API. The response/output provided by this
password username etc within the target domain indexed API is a set of latitude and longitude coordinates for the
by the search Engine. address provided.
For example:
3. Email Reconnaissance: Request:
This module does the job of detecting if an account exists "formatted_address" : "56/69,BR Gardens, Gandhi Nagar,
with this Email-Id across various forums. It also verifies Delhi-110019".
if the specified Email-ID has been part of any data
breach, if so it also notifies the user of the source site of Response:
the breach. User names can also be extracted from email- "geometry" : {
id‟s by using regular expressions to split data based on "location" : {
certain special characters. Domain names within which "lat" : 37.4224764,
the email falls in can also be determined. Domain names "lng" : -122.0842499
can be used in who is lookup to extract valuable }}
information about it.
Working: 6. Identifying Interesting Artifacts:
1.Email-verification:Initially this modules verifies if the Interesting artifacts refers to all readable files that may be
mail address exists or if it is invalid, this operation is available on websites, servers. These files hold sensitive
performed in stages by first connecting to the target mail data and may or may not be leftover on purpose. In some
server and then verifying if the target mailbox exists in negligent cases, this has resulted in serious security issues
the mail server. to organisations since the data on the file may be of high
2.Breach data Analysis : Breach data analysis involves significance.
checking if the particular email address has been present Interesting information can also be obtained by
in data breaches,this is performed by querying the Breach using files like robots.txt, sitemap.xml files. Robots.txt
data monitoring websites such as have i been pwned file contains a list of directories that should not be
,Dehashed etc. indexed by web crawlers. This helps in extracting
interesting locations on the website.
4. Fetching information on SSL Certificates:
Since most of the domains which are hosted on the 7. DNS:
internet nowadays have a higher probability of having DNS holds major information about a website.
SSL certificate to enable secure data sharing between the This can be used to extract the IP address of the server. In
server hosted and client programs. This module focuses turn, this IP address can be passed to various modules for
on these SSL certificates to gather valuable information processing based on the IP address.
associated with owners of these certificates.
Working: Working:
1.CT-logs- Google's Certificate Transparency Program DNSSEC Zone walking:
Provides organizations an option to verify their Zonewalking is a technique where it unveils
subdomain and certificates further since it is open source Internal records if the zone is not configured properly.The
it can be leveraged to gather the subdomains of an information that can be obtained can help us to map
organization. network hosts by enumerating the contents of a zone.
2.crt.sh - Certificate Search based on crt.sh provides on
the organization's certificates issued along with the Configuration Enumeration:
respective subdomain Gather and analyse NS, MX, AXFR
and A records, as well as remote BIND version from the
5. Fetching Location Information: DNS server which may provide data about the target if
Location based reconnaissance can be done just the target has a dedicated dns server either in On-prem or
by making use of an IP address. This IP address can be cloud.
specified by the user or maybe obtained upon resolving
DNS of the host. This IP address can be used to extract its 8. Tor Based Recon:
current physical location. Tor uses a relay network to mask the original point of
data. When the data or packet reaches its destination
Working: server, it appears to have originated from the Tor exit
Upon resolving the IP address of the host, its exact point i.e. the last node in the relay. The main focus of this
physical location can be obtained by passing it to the module is to check whether the target IP has been listed
Working:
In order to detect whether the IP is using Tor, we
provide this IP as a parameter to Exonerator-Tor Metrics.
Upon passing, it checks it against a database of IP‟s
enlisted that have been a part of Tor network. If it
matches an IP in the list, it is affirmative that the IP is a
Tor node.
Example:
“https://metrics.torproject.org/exonerator.html?ip=”IP”&t
imestamp=”Timestamp”&lang=en”
Process:
On execution of the handler which interacts with the UI
components, the input (target) from the user is obtained,
based on the nature of the target the handler invokes the
model in a certain fashion based on the interoperability
and relationship between these modules. Further the data
obtained from the execution of either single or multiple
interoperated modules is pushed into an elastic search
which is a database cum search engine that allows further
correlating data between the data points and also allows
custom search and querying of the data.
5. Sample Screenshot
References
[1] https://www.hackerone.com/blog/how-to-recon-
and-content-discovery
[2] Open Source Intelligence Methods and Tools: A
Practical Guide to Online Intelligence by
NihadA.Hassan, Rami Hijazi
[3] Open Source Intelligence Techniques: Resources
for Searching and Analyzing Online Information
by Michael Bazzell
[4] Web Mining for Open Source Intelligence
[5] Open source intelligence base cyber threat
inspection framework for critical infrastructures
[6] https://medium.com/bugbountywriteup/whats-
tools-i-use-for-my-recon-during-bugbounty-
ec25f7f12e6d
[7] https://www.hackerone.com/blog/how-to-recon-
and-content-discovery