πExternal Information Gathering
π― Overview
π Initial Network Reconnaissance
π Quick Port Discovery
# Initial top 1000 ports scan
sudo nmap --open -oA target_tcp_1k -iL scope
# Key findings analysis:
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
25/tcp open smtp
53/tcp open domain
80/tcp open http
110/tcp open pop3
143/tcp open imap
993/tcp open imaps
995/tcp open pop3s
8080/tcp open http-proxy
# Service categories identified:
- Web services (80, 8080)
- Email services (25, 110, 143, 993, 995)
- File transfer (21)
- Remote access (22)
- DNS services (53)π§ Comprehensive Service Enumeration
π Service Analysis with Nmap Grep
π DNS Enumeration
π DNS Zone Transfer Attack
π Alternative DNS Enumeration
π Virtual Host Discovery
π VHost Enumeration Process
π§ Alternative VHost Tools
π Host File Configuration
π§ Adding Discovered Hosts
π― HTB Academy Lab Solutions
Lab Environment
π Question 1: Banner Grab Non-Standard Service
π Question 2: DNS Zone Transfer Flag
π Question 3: Flag Subdomain FQDN
π Question 4: Additional VHost Discovery
π Information Gathering Workflow
π Systematic Approach
π― Attack Surface Mapping
β οΈ Reconnaissance Best Practices
π Stealth Considerations
π Documentation Standards
π‘ Key Takeaways
Last updated