Target recognition

Knockpy

Knockpy is a command-line tool for discovering subdomains. This is useful when you just have a main domain and you need to find all the applications or modules included in it. Verify the agreed scope of the assessment; you may not be allowed to look for all subdomains.

HostileSubBruteforcer

HostileSubBruteforcer is a command-line tool that works very similar to Knockpy. It sends requests to a domain, using common names to create subdomains, in order to discover new ones and also servers that you did not know about. As with Knockpy, this is active, so check agreed scope.

FFuf

FFUF, short for “Fuzz Faster you Fool” is an open-source web fuzzing tool written in Go programming language, intended for discovering elements and content within web applications, or web servers.

  • General Directory discovery with the option to fuzz at any place in the URL.

  • VHOST discovery without DNS Records

  • Fuzzing using various HTTP methods.

Assetfinder

assetfinder is a Go-based tool to find related domains and subdomains that are potentially related to a given domain from a variety of sources, including those in the infosec space and social networks which can give relevant info:

Nmap

Nmap, without doubt, is the most powerful port scanner and service enumerator that exists and has vulnerability scanning capabilities.

Rustscan

RustScan is a modern take on port scanning. It uses Adaptive Learning to improve itself over time. It scans so fast that I recommend

Shodan

Shodan is the largest IT database in the world. It includes information about hosts, technologies supported, domain changes, information tracked by searchers, and sensitive information, such as configuration files, IP addresses, and credentials. You can access Shodan through an API, but you need to pay for full access.

What CMS

What CMS is an online tool that helps to determine if a website is using a CMS, and if it does, it identifies what CMS the website is using.

Recon-ng

Recon-ng is a Reconnaissance framework that uses different sources to ask for information about a target. The results include name servers, IP addresses, subdomains, and inclusive zone transfers when these are allowed to be consulted.