Passive Reconnaissance
Whois
Whois is a TCP service and type of database that can provide information about a domain name (e.g. the name server and registrar). This information is most often public because registrars charge a fee for private registration.
Google Dorks / Google Hacking
Check out this huge database of creative Google Dorks for various purposes. There is also several tools that helps with building complex Google queries: DorkSearch.com.
Most interesting parameters of Google search engine:
Quick hints:
File metadata
Check metadata of files hosted on the website:
Web Aggregators
There are some sites that aggregate data on multiple Internet domains for various reasons. They are a great source of passive knowledge about a site. With them, you can e.g. discover subdomains without enumeration.
NOTE: It's worth to check various tools. Results may vary.
- Netcraft - very detailed report about domains and subdomains.
- crt.sh - great resource for subdomains enumeration.
- ViewDNS.info - various tools.
- [Shodan.io] - you know what it is ;)
Source Code Inspection
Inspection of the source code sent to the front-end can give good results. Comments and framework-specific artifacts are often left behind. Back-end frameworks sometimes add their headers to the HTTP response. Inspection of HTTP requests and responses can provide answers.
The names of HTML classes or libraries used may be specific to a particular framework. File extensions, default files and folder names can also be helpful in identifying a specific technology. X-
headers (non-standard HTTP headers) might reveal internal server technologies.
It might be worth to check robots.txt
file and look for sitemap files.
Wappalyzer
Wappalyzer is a free tool that aggregates information about the technologies (i.e. frameworks, libraries, servers and languages) used by websites.
Callback gathering
https://canarytokens.org/nest/ is a great site for intercepting requests of all kinds and reading useful information from them. When the target opens the generated link in a browser, an attacker will get information about their browser, IP address, and operating system.