| Resource | Examples |
|---|---|
ASN / IP registrars |
IANA, arin for searching the Americas, RIPE for searching in Europe, BGP Toolkit |
Domain Registrars & DNS |
Domaintools, PTRArchive, ICANN, manual DNS record requests against the domain in question or against well known DNS servers, such as 8.8.8.8. |
Social Media |
Searching Linkedin, Twitter, Facebook, your region's major social media sites, news articles, and any relevant info you can find about the organization. |
Public-Facing Company Websites |
Often, the public website for a corporation will have relevant info embedded. News articles, embedded documents, and the "About Us" and "Contact Us" pages can also be gold mines. |
Cloud & Dev Storage Spaces |
GitHub, AWS S3 buckets & Azure Blog storage containers, Google searches using "Dorks" |
Breach Data Sources |
HaveIBeenPwned to determine if any corporate email accounts appear in public breach data, Dehashed to search for corporate emails with cleartext passwords or hashes we can try to crack offline. We can then try these passwords against any exposed login portals (Citrix, RDS, OWA, 0365, VPN, VMware Horizon, custom applications, etc.) that may use AD authentication. |
Tools like Trufflehog and sites like Greyhat Warfare are fantastic resources for finding these breadcrumbs.
We can use a tool such as linkedin2username to scrape data from a company's LinkedIn page and create various mashups of usernames (flast, first.last, f.last, etc.) that can be added to our list of potential password spraying targets.
Dehashed is an excellent tool for hunting for cleartext credentials and password hashes in breach data
We can search either on the site or using a script that performs queries via the API.
**sudo python3 dehashed.py -q inlanefreight.local -p**
Sites like domaintools, and viewdns.info