Reconnaissance

Although every hacker is looking forward to pwning the system, reconnaissance may be the most important part of the hacking process. In many cases, reconnaissance can consume 70-80% of the time of the hacking process. Without good reconnaissance, your hacking attempts are likely to be for naught.

Exploits are very specific to the technology being utilized. This can include the operating system (OS), the applications being run, the ports and services, and even the language of the system. We must gather all that information and sometimes even more before we select the right approach to exploit the system.

In this section, I will show you numerous ways to gather information on the target. Some of these include;

1. Google  Hacking

2. Email Scraping

3. SNMP

4. OS Fingerprinting

5. Determining the Target’s AV software 

6. Abusing DNS for Reconnaissance

7. Using nmap for Reconnaissance

8. Using hping3 for Reconnaissance

9. Using Maltego for Domain Recon

10. Using Maltego for Recon of a Person

11. Using FOCA to Obtain Website Metadata