Advanced Recon Methodology
#methodology#recon
Commands
subfinder -d example.com -all -recursive > subdomain.txt
For finding subdomains
cat subdomain.txt | httpx-toolkit -ports 80,443,8080,8000,8888 -threads 200 > subdomains_alive.txt
For filter out live subdomains
katana -u subdomains_alive.txt -d 5 -ps -pss waybackarchive,commoncrawl,alienvault -kf -jc -fx -ef woff,css,png,svg,jpg,woff2,jpeg,gif,svg -o allurls.txt
For fetching passive urls
cat allurls.txt | grep -E '\.xls|\.xml|\.xlsx|\.json|\.pdf|\.sql|\.doc|\.docx|\.pptx|\.txt|\.zip|\.tar\.gz|\.tgz|\.bak|\.7z|\.rar|\.log|\.cache|\.secret|\.db|\.backup|\.yml|\.gz|\.config|\.csv|\.yaml|\.md|\.md5'
For finding sensitive files
Tips & Best Practices
Always verify live subdomains before further testing
Use rate limiting to avoid getting blocked
Combine passive and active recon for better results
Check for common misconfigurations in cloud services
Monitor for sensitive data exposure in public files
Verify potential vulnerabilities before reporting
Use multiple tools to ensure comprehensive coverage
Document your findings and methodology