Web Reconnaissance Notes
Introduction
Web reconnaissance is the systematic collection of information about target websites/web applications, forming the foundation of security assessments and penetration testing.
Methodology
1. Initial Information Gathering
Passive Reconnaissance
WHOIS lookups
DNS enumeration
Search engine discovery
Certificate transparency logs
Web archives analysis
Social media research
Code repository analysis
Active Reconnaissance
Port scanning
Service enumeration
Banner grabbing
Vulnerability scanning
Web spidering
Network mapping
2. Domain & DNS Analysis
WHOIS Lookup
DNS Enumeration
Subdomain Enumeration
3. Virtual Host Discovery
4. Fingerprinting
5. Web Crawling & Content Discovery
Essential Tools
1. DNS & Subdomain Tools
dig: DNS lookup utility
dnsenum: Comprehensive DNS enumeration
subfinder: Modern subdomain discovery
amass: In-depth DNS enumeration and asset discovery
2. Web Scanning Tools
Nikto: Web server scanner
Wappalyzer: Technology stack identification
wafw00f: Web Application Firewall detector
Burp Suite: Comprehensive web application testing platform
3. Crawling & Content Discovery
Scrapy: Python-based web crawling framework
Burp Suite Spider: Web application crawler
OWASP ZAP: Security testing proxy with crawling capabilities
4. Automation Frameworks
FinalRecon: All-in-one web reconnaissance tool
Recon-ng: Web reconnaissance framework
theHarvester: Email, subdomain, and people gathering tool
SpiderFoot: OSINT automation tool
Google Dorks for Reconnaissance
Common search operators:
Well-Known URIs to Check
Best Practices
Start Passive, Then Active
Begin with non-intrusive methods
Escalate to active scanning only when necessary
Document Everything
Record all findings
Note unusual responses or behavior
Track discovered assets
Legal & Ethical Considerations
Obtain proper authorization
Follow scope limitations
Respect robots.txt when appropriate
Monitor resource usage to avoid DoS
Validation & Verification
Cross-reference findings from multiple tools
Verify discovered vulnerabilities
Document false positives
Reporting Tips
Organization
Group findings by category
Prioritize based on risk
Include evidence and screenshots
Technical Details
Document commands used
Include tool versions
Note any special configurations
Remediation
Provide clear fixing steps
Include references to best practices
Suggest testing procedures