#External Focused Recon
Resolve domain records and validates DNS functionality.
dig example.comIdentify authoritative name servers for a domain.
dig NS example.comRetrieves mail server information, useful for email attack surface mapping.
dig MX example.comAttempt a DNS zone transfer to dump all DNS records if misconfigured.
dig AXFR example.com @ns1.example.comPerform basic DNS resolution using the system resolver.
nslookup example.comQuickly resolve DNS records with concise output.
host example.comPassively discover subdomains using known data sources.
subfinder -d example.comActively enumerate subdomains using DNS brute force and scraping.
amass enum -d example.comPerform passive-only subdomain discovery to reduce noise.
amass enum -passive -d example.comIdentify web technologies such as frameworks, CMS, and server software.
whatweb https://targetDetect client- and server-side technologies used by a web application.
wappalyzer https://targetRetrieve HTTP headers to inspect server behavior and security controls.
curl -I https://targetFetch web content while ignoring TLS certificate validation errors.
curl -k https://targetBrute-force directories and files to uncover hidden web content.
gobuster dir -u https://target -w wordlist.txtBrute-force subdomains via DNS resolution.
gobuster dns -d example.com -w wordlist.txtFast fuzzing of URL paths to discover hidden endpoints.
ffuf -u https://target/FUZZ -w wordlist.txtFuzz subdomains to identify additional virtual hosts.
ffuf -u https://FUZZ.target -w wordlist.txtRetrieve domain registration data and ownership metadata.
whois example.comCollect emails, hosts, and subdomains from public sources.
theHarvester -d example.com -b allIdentify corporate email address patterns and known emails.hunter.io
Search certificate transparency logs for related subdomains.crt.sh
Find internet-facing systems associated with an organization.shodan search "org:ExampleCorp"
Enumerate exposed services and certificates across the internet.censys search example.com
Historical and current DNS intelligence.securitytrails.com
Harvest email addresses associated with a domain.
theHarvester -d example.com -b emailReputation and risk indicators for email addresses.emailrep.io
Check if an S3 bucket is publicly accessible.
aws s3 ls s3://bucket-nameDetermine the identity and permissions of the current AWS credentials.
aws sts get-caller-identityList accessible Google Cloud projects for the authenticated account.
gcloud projects listEnumerates Azure subscriptions tied to the current credentials.
az account listAutomatically screenshot discovered web services for quick visual triage.
aquatoneCapture a screenshot of a single web target.
gowitness scan single https://target#Internal Focused Recon
Discover live hosts on the local network by sending ARP requests; fast and noisy but very accurate on LANs.
arp-scan -lPerform ARP-based discovery across a subnet to identify active IPs and MAC addresses.
netdiscover -r 10.0.0.0/24Conduct a ping sweep to identify which hosts are alive without scanning ports.
nmap -sn 10.0.0.0/24Use ARP requests instead of ICMP for host discovery, effective on local networks.
nmap -PR -sn 10.0.0.0/24Scan all 65,535 TCP ports and reports only open ones for full service coverage.
nmap -p- --open -T4 targetRun default NSE scripts and performs service/version detection on open ports.
nmap -sC -sV targetPerform a stealth SYN scan while skipping host discovery, useful when ICMP is blocked.
nmap -sS -Pn targetRun vulnerability detection scripts against discovered services.
nmap --script vuln targetScan the most common UDP ports to identify exposed UDP services.
nmap -sU --top-ports 100 targetList SMB shares without authentication if anonymous access is allowed.
smbclient -L //target -NEnumerate users, shares, and domain info via SMB and RPC.
enum4linux targetQuery RPC services anonymously for user and domain information.
rpcclient -U "" targetAttempt to dump SNMP data using the default public community string.
snmpwalk -c public -v1 targetPerform automated SNMP enumeration and configuration checks.
snmp-check targetCapture wireless traffic and identifies nearby access points and clients.
airodump-ng wlan0Detect WPS-enabled access points and their configuration.
wash -i wlan0#Notes
Passive recon should be exhausted before active scanning when possible.
Always record negative results, absence of exposure is still signal.