"Hackers make the mistake of paying attention to the exploitation process, and neglecting the information gathering stage “

So i will talk about Reconnaissance ..

💭 Whoami :

I'm Omar AbuZekri [ 0xN3ssus ] , Cyber Security Researcher at BugCrowd

🛫 Plan

Full simple Reconnaissance

Most hackers, when they set a specific target, do not know where to start! So, let me explain my path in the reconnaissance process ..

I am seeking to obtain the following:

My principle is from start to finish ..

1-IPs 2-Subdomains 3-Js Files 4-Directories 5-Parameters 6- Emails

With the 6 elements, I can get 6 files, as a basic infrastructure for my reconnaissance project. Yes, this is only the basic stage and then I start the next phase..

Then, How i got my project’s Infrastructure ?