Skip to content

Latest commit

 

History

History
53 lines (31 loc) · 1.61 KB

README.md

File metadata and controls

53 lines (31 loc) · 1.61 KB

Reconnaissance

In the context of cybersecurity, reconnaissance is the practice of covertly discovering and collecting information about a system. This method is often used in ethical hacking or penetration testing.

How Reconnaissance Works

1.Collect initial information
2.Determine the network range
3.Identify active machines
4.Find access points and open ports
5.Fingerprint the operating system
6.Discover services on ports
7.Map the network

Types of Reconnaissance

1.Active Reconnaissance:
-With active reconnaissance, hackers interact directly with the computer system and attempt to obtain information.

2.Passive Reconnaissance:
-Passive reconnaissance gathers information without directly interacting with systems.

Top 3 tools used for Passive Reconnaissance

1.Google
2.Shodan
3.Github

Payloads

Google Dorking Payload
Shodan Dorking Payload
GitHub Dorking Payload

Top Findings

https://hackerone.com/reports/397527

https://hackerone.com/reports/493176

https://hackerone.com/reports/502758

References

https://github.com/TUXCMD/Google-Dorks-Full_list/blob/master/googledorks_full.txt

https://shahjerry33.medium.com/github-recon-its-really-deep-6553d6dfbb1f

https://github.com/lothos612/shodan/blob/main/Shodan%20Dorks.jex