πŸ”External Information Gathering

🎯 Overview

External Information Gathering is the critical first phase of enterprise network attacks. This process involves systematic reconnaissance to map the attack surface, identify services, discover subdomains, and gather intelligence for targeted exploitation against external-facing infrastructure.

πŸ” Initial Network Reconnaissance

πŸ“Š Quick Port Discovery

# Initial top 1000 ports scan
sudo nmap --open -oA target_tcp_1k -iL scope

# Key findings analysis:
PORT     STATE SERVICE
21/tcp   open  ftp
22/tcp   open  ssh
25/tcp   open  smtp
53/tcp   open  domain
80/tcp   open  http
110/tcp  open  pop3
143/tcp  open  imap
993/tcp  open  imaps
995/tcp  open  pop3s
8080/tcp open  http-proxy

# Service categories identified:
- Web services (80, 8080)
- Email services (25, 110, 143, 993, 995)
- File transfer (21)
- Remote access (22)
- DNS services (53)

πŸ”§ Comprehensive Service Enumeration

πŸ“ˆ Service Analysis with Nmap Grep

🌐 DNS Enumeration

πŸ“‹ DNS Zone Transfer Attack

πŸ” Alternative DNS Enumeration

🌐 Virtual Host Discovery

πŸ“Š VHost Enumeration Process

πŸ”§ Alternative VHost Tools

πŸ“ Host File Configuration

πŸ”§ Adding Discovered Hosts

🎯 HTB Academy Lab Solutions

Lab Environment

πŸ” Question 1: Banner Grab Non-Standard Service

🌐 Question 2: DNS Zone Transfer Flag

πŸ“ Question 3: Flag Subdomain FQDN

πŸ” Question 4: Additional VHost Discovery

πŸ”„ Information Gathering Workflow

πŸ“Š Systematic Approach

🎯 Attack Surface Mapping

⚠️ Reconnaissance Best Practices

πŸ”’ Stealth Considerations

πŸ“‹ Documentation Standards

πŸ’‘ Key Takeaways

  1. Systematic enumeration reveals complete attack surface

  2. DNS zone transfers provide valuable subdomain intelligence

  3. VHost discovery uncovers hidden applications

  4. Service versioning enables vulnerability research

  5. Anonymous access often provides immediate foothold opportunities

  6. Comprehensive documentation essential for attack planning

  7. Multiple enumeration methods ensure complete coverage


External information gathering establishes the foundation for enterprise network attacks by mapping the complete external attack surface and identifying high-value targets for exploitation.

Last updated