Information Gathering

Passive Gathering

Netcraft

https://searchdns.netcraft.com/?restriction=site+contains&host=megacorpone.com

Shodan

# Banner Lookup
megacorpone.com

# Reverse DNS Lookup
hostname:megacorpone.com

# SSL Cert Lookup
ssl.cert.subject.cn:megacorpone.com

# Result
https://www.shodan.io/host/66.70.207.180
https://www.shodan.io/host/51.79.37.18
https://www.shodan.io/host/51.222.39.63
https://www.shodan.io/host/149.56.244.87

Web Scraping

# Manual
https://dns.bufferover.run/dns?q=megacorpone.com
https://api.hackertarget.com/hostsearch/?q=megacorpone.com
https://rapiddns.io/subdomain/megacorpone.com
https://jldc.me/anubis/subdomains/megacorpone.com
https://api.sublist3r.com/search.php?domain=megacorpone.com

# Auto
amass enum -passive -d megacorpone.com -src

Linkedin

https://www.linkedin.com/search/results/companies/?keywords=megacorpone

Active Gathering

DNS

dig megacorpone.com any

Zone Transfer

host -t NS megacorpone.com | cut -d " " -f 4 | while read line;
do
host -t AXFR megacorpone.com $line;
done

Brute Force

wget https://raw.githubusercontent.com/rbsec/dnscan/master/subdomains-10000.txt
gobuster dns -d megacorpone.com -w subdomains-10000.txt

Resolving

cat hosts.txt | while read line;
do
host $line | grep "has address" | cut -d " " -f 1,4;
done

Last updated