Othmane Moutaouakkil
LinkedInGitHub
  • Introduction
  • OSCP Journey
    • HTB
      • HTB Linux Boxes
      • HTB Windows Boxes
  • Write-Ups
    • TCM Security
      • Practical Ethical Hacking
        • Networking Refresher
        • The Ethical Hacker Methodology
        • Information Gathering (Reconnaissance)
        • Scanning & Enumeration
        • Vulnerability Scanning with Nessus
        • Exploitation Basics
        • New Capstone
        • Active Directory (AD)
          • AD Overview
          • AD Lab Build
          • Attacking AD: Initial Attack Vectors
          • Attacking AD: Post-Compromise Enumeration
          • Attacking AD: Post-Compromise Attacks
          • We've Compromised the Domain - Now What?
          • Additional AD Attacks
          • AD Case Studies
        • Post Exploitation
        • Web Application Enumeration, Revisited
        • Find & Exploit Common Web Vulnerabilities
        • Wireless Penetration Testing
        • Legal Documents and Report Writing
      • Open-Source Intelligence (OSINT)
    • Hacking Challenges
      • OTW
        • Bandit
          • Level 0
          • Level 0 → 1
          • Level 1 → 2
          • Level 2 → 3
          • Level 3 → 4
          • Level 4 → 5
          • Level 5 → 6
          • Level 6 → 7
          • Level 7 → 8
          • Level 8 → 9
          • Level 9 → 10
          • Level 10 → 11
          • Level 11 → 12
          • Level 12 → 13
          • Level 13 → 14
          • Level 14 → 15
          • Level 15 → 16
          • Level 16 → 17
          • Level 17 → 18
          • Level 18 → 19
        • Natas
        • Leviathan
        • Krypton
        • Narnia
        • Behemoth
        • Utumno
        • Maze
        • Vortex
        • Manpage
        • Drifter
        • FormulaOne
      • THM
  • Research
  • Resume
Powered by GitBook
On this page
  • Passive Recon
  • Identifying The Target
  • Discovering Email Addresses
  • Gathering Breached Credentials with Breach-Parse
  • Hunting Breached Credentials with DeHashed
  • Hunting Subdomains
  • Identifying Website Technologies
  • Information Gathering with Burp Suite
  • Google Fu
  • Utilizing Social Media
  • Additional Learning, Open-Source Intelligence (OSINT)

Was this helpful?

  1. Write-Ups
  2. TCM Security
  3. Practical Ethical Hacking

Information Gathering (Reconnaissance)

PreviousThe Ethical Hacker MethodologyNextScanning & Enumeration

Last updated 7 months ago

Was this helpful?

Passive Recon

Physical Engagement/Social Engineering:

  • Location Information:

    • Satellite images

    • Drone recon

    • Building layout (badge readers, break areas, security, fencing)

  • Job Information:

    • Employees (name, job title, phone number, manager, etc.)

    • Pictures (badge photos, desk photos, computer photos, etc.)

Web/Host:

  • Target Validation: , ,

  • Finding Subdomains: , , , , ,

  • Fingerpriting: , , , ,

  • Data Breaches: , ,

Identifying The Target

Read the program details carefully and ensure that your testing activities comply with the authorized targets and rules outlined.

Discovering Email Addresses

Gathering Breached Credentials with Breach-Parse

breach-parse @t-mobile.com t-mobile.txt "~/Downloads/BreachCompilation/data"

The obtained results can be leveraged for Credential Stuffing and Password Spraying.

Hunting Breached Credentials with DeHashed

Hunting Subdomains

  1. Synchronize the local package database with repository sources:

sudo apt update
  1. Install Sublist3r tool:

sudo apt install sublist3r
  1. Run Sublist3r:

sublist3r -d t-mobile.com

This enumerates subdomains of T-Mobile.com using various search engines.

  1. Install the GCC-based compiler for the Go programming language:

sudo apt install gccgo-go
  1. Install the official Go programming language compiler and tools developed by Google:

sudo apt install golang-go
  1. Install OWASP Amass:

go install -v github.com/owasp-amass/amass/v4/...@master
  1. Run OWASP Amass:

  1. Enumerate subdomains of T-Mobile.com:

  1. Install httprobe:

sudo apt install httprobe
  1. Run httprobe with domains.txt:

cat ~/Desktop/domains.txt | httprobe

This will narrow the list to the active subdomains.

Identifying Website Technologies

This will display a detailed list of technologies T-mobile.com is built with:

  • Analytics and Tracking

  • Widgets

  • Language

  • Frameworks

  • Mapping

  • Content Delivery Network

  • Mobile

  • Payment

  • Audio / Video Media

  • Content Management System

  • JavaScript Libraries and Functions

  • Verified Link

  • Advertising

  • SSL Certificates

  • Name Server

  • Email Hosting Providers

  • Web Hosting Providers

  • Web Servers

  • Operating Systems and Servers

  • Verified CDN

  • Robots.txt

  • Web Master Registration

  • Content Delivery Network

Preview of Analytics and Tracking:

whatweb t-mobile.com
whatweb tmobile.com

Information Gathering with Burp Suite

  1. Set up Firefox for using Burp Suite:

  1. Access https://burp and download the CA Certificate:

  1. Import the CA Certificate:

  1. Access T-Mobile.com through Firefox:

Here we can find very useful information.

Google Fu

Google-Fu (uncountable) (informal) A skill in using search engines (especially Google) to quickly find useful information on the Internet.

Example:

site:t-mobile.com -www filetype:pdf
  • site:t-mobile.com: Restricts search to t-mobile.com and its subdomains

  • -www: Excludes results from www.t-mobile.com

  • filetype:pdf: Returns only PDF files

Utilizing Social Media

Additional Learning, Open-Source Intelligence (OSINT)

Use (a public Bug Bounty Program) to identify the target T-Mobile.

- find and verify professional email addresses

- lists all domains, email addresses, or URLs for the given input domain.

- great for getting the email addresses you need.

- free, verified B2B emails (it has to be used on Chrome).

- free online email verification tool.

- a tool for parsing breached passwords

- Have you been compromised? DeHashed provides free deep-web scans and protection against credential leaks.

Hashes.org is down, therefore, use or other tools to decrypt the hashed passwords.

- Finding Subdomains

- to look for registered certificates

- In-depth attack surface mapping and asset discovery

- Take a list of domains and probe for working HTTP and HTTPS servers

- Web technology information profiler tool. Find out what a website is built with.

- Identify technologies on websites

- Next generation web scanner version

- The class-leading vulnerability scanning, penetration testing, and web app security platform. Burp Suite's main feature is the Proxy. The Proxy enables Burp to act as an intermediary between the client (web browser) and the server hosting the web application.

- The Complete List (44 Advanced Operators)

Social media platforms like , , , , etc. are valuable resources for conducting Open-Source Intelligence (OSINT) gathering through publicly available information.

On a separate page:

WHOIS
nslookup
dnsrecon
Google FU
dig
Nmap
Sublist3r
Bluto
crt.sh
Nmap
Wappalyzer
WhatWeb
BuiltWith
Netcat
HaveIBeenPwned
Breach-Parse
WeLeakInfo
Bugcrowd
Hunter.io
Phonebook.cz
Voila Norbert
Clearbit
Email Hippo
breach-parse
DeHashed
Hashes.com
Sublist3r
crt.sh
OWASP Amass
httprobe
BuiltWith
Wappalyzer
WhatWeb
Burp Suite
Google Search Operators (Dorks)
LinkedIn
Twitter (X)
Facebook
Instagram
Open-Source Intelligence (OSINT)
sublist3r -d t-mobile.com
crt.sh
Certificates
OWASP amass
Enumerate subdomains of T-Mobile.com
cat ~/Desktop/domains.txt | httprobe
Wappalyzer - T-Mobile.com
whatweb t-mobile.com && whatweb tmobile.com
Set up Firefox for using Burp Suite
Access https://burp and download the CA Certificate
Import the CA Certificate
Access T-Mobile.com through Firefox
T-Mobile
T-Mobile email addresses found using Hunter.io
https://bugcrowd.com/engagements/t-mobile
https://hunter.io/try/search/t-mobile.com?locale=en
https://dehashed.com
https://builtwith.com
https://builtwith.com/t-mobile.com