πExternal Information Gathering
π― Overview
External Information Gathering is the critical first phase of enterprise network attacks. This process involves systematic reconnaissance to map the attack surface, identify services, discover subdomains, and gather intelligence for targeted exploitation against external-facing infrastructure.
π Initial Network Reconnaissance
π Quick Port Discovery
# Initial top 1000 ports scan
sudo nmap --open -oA target_tcp_1k -iL scope
# Key findings analysis:
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
25/tcp open smtp
53/tcp open domain
80/tcp open http
110/tcp open pop3
143/tcp open imap
993/tcp open imaps
995/tcp open pop3s
8080/tcp open http-proxy
# Service categories identified:
- Web services (80, 8080)
- Email services (25, 110, 143, 993, 995)
- File transfer (21)
- Remote access (22)
- DNS services (53)π§ Comprehensive Service Enumeration
π Service Analysis with Nmap Grep
π DNS Enumeration
π DNS Zone Transfer Attack
π Alternative DNS Enumeration
π Virtual Host Discovery
π VHost Enumeration Process
π§ Alternative VHost Tools
π Host File Configuration
π§ Adding Discovered Hosts
π― HTB Academy Lab Solutions
Lab Environment
π Question 1: Banner Grab Non-Standard Service
π Question 2: DNS Zone Transfer Flag
π Question 3: Flag Subdomain FQDN
π Question 4: Additional VHost Discovery
π Information Gathering Workflow
π Systematic Approach
π― Attack Surface Mapping
β οΈ Reconnaissance Best Practices
π Stealth Considerations
π Documentation Standards
π‘ Key Takeaways
Systematic enumeration reveals complete attack surface
DNS zone transfers provide valuable subdomain intelligence
VHost discovery uncovers hidden applications
Service versioning enables vulnerability research
Anonymous access often provides immediate foothold opportunities
Comprehensive documentation essential for attack planning
Multiple enumeration methods ensure complete coverage
External information gathering establishes the foundation for enterprise network attacks by mapping the complete external attack surface and identifying high-value targets for exploitation.
Last updated