πInfrastructure Enumeration
Overview
Core Principles
Domain Information Gathering
1. Certificate Transparency
# Basic search in browser
https://crt.sh/?q=example.com
# JSON output for parsing
curl -s https://crt.sh/\?q\=example.com\&output\=json | jq .
# Extract unique subdomains
curl -s https://crt.sh/\?q\=example.com\&output\=json | jq . | grep name | cut -d":" -f2 | grep -v "CN=" | cut -d'"' -f2 | awk '{gsub(/\\n/,"\n");}1;' | sort -u2. Company Hosted vs Third-Party
3. Shodan Intelligence
DNS Enumeration
Overview
DNS Record Types
Record Type
Description
DNS Configuration Analysis
BIND9 Configuration Files
Zone File Structure
Dangerous DNS Configurations
Option
Risk Level
Description
DNS Enumeration Techniques
1. Basic DNS Queries
2. Name Server Discovery
3. DNS Version Detection
4. SOA Record Analysis
5. Zone Transfer Attacks
6. Reverse DNS Lookups
Advanced DNS Enumeration
Subdomain Discovery
Using DNSenum
Using Fierce
Using Sublist3r
DNS Security Assessment
Zone Transfer Testing
DNS Cache Poisoning Tests
DNS Amplification Testing
Information Extraction from DNS
Email Server Discovery
TXT Record Analysis
Internal Infrastructure Discovery
DNS Enumeration Checklist
Initial Discovery
Zone Transfer Testing
Subdomain Discovery
Information Analysis
Tools and Scripts
Essential DNS Tools
Custom Scripts
Defensive Measures
Secure DNS Configuration
Monitoring and Detection
Third-Party Service Identification
Services and Attack Vectors
Service
Attack Vectors
Notes
IP Address Discovery from SPF
Passive Information Gathering Workflow
Phase 1: Initial Domain Analysis
Phase 2: Infrastructure Mapping
Phase 3: Third-Party Analysis
Phase 4: Cloud Resource Discovery
Phase 5: Intelligence Synthesis
Tools and Commands
Essential Tools
One-Liner Commands
Defensive Considerations
Information Leakage Prevention
Monitoring and Detection
Cloud Resources Discovery
Overview
Common Cloud Storage Types
Provider
Storage Type
URL Pattern
Discovery Methods
1. DNS Enumeration
2. Google Dorking for Cloud Storage
3. Source Code Analysis
Specialized Tools
1. Domain.Glass
2. GrayHatWarfare
3. Automated Tools
High-Value Targets
Critical Files to Search For
File Type
Examples
Risk Level
Example: SSH Key Discovery
Common Misconfigurations
AWS S3 Bucket Issues
Azure Blob Storage
Cloud Resource Workflow
Phase 1: Initial Discovery
Phase 2: Targeted Search
Phase 3: Content Analysis
Phase 4: Exploitation
Detection and Prevention
Defensive Measures
Detection Methods
Real-World Impact
Common Scenarios
Business Impact
Key Takeaways
References
Last updated