🖍️
nullbrain
  • Intro
  • Tools
    • Preparation
  • basics/pre-req
    • Backpack
    • Linux
  • Working Tools
    • List of Note taking tools!
  • Practice Tools
    • Netcat
    • Socat
    • Powercat
    • PowerShell
  • Network Analysis Tools
    • Wireshark
    • Tcpdump
  • PRIVILEGE ESCALATION
    • Example
    • 🏁Kernel Exploits
    • 🪛Credentials
      • Reuse Passwords
      • Bash History
      • Local Database
  • Passive Information Gathering
    • Index
    • Tools
      • Recon-ng
        • Recon-ng [Usage]
      • Google Hacking DB [GHDB]
      • Whois
    • Techniques
      • Google Hacking
      • Website Recon
        • WR with Python
  • Active Information Gathering
    • Enumeration
      • NFS
      • SMB
    • Masscan
    • Nmap
    • Port Scanning
    • DNS
      • Scripts
      • Lookup
      • DNSRecon
      • DNSenum
  • Vulnerability Scanning
    • Vulnerability Scanning
    • Nmap
  • Web Application Exploit
    • Enumeration
      • Techniques
    • Tools
      • DIRB
  • Buffer Overflow
    • Memory
  • Real World!
    • Bruteforce
    • Tools
    • Enumeration
      • Enumeration MindMap
      • Tools
    • SQL Injection
    • Server-Side Template Injection
    • Hashcat
      • Hashcat options
    • Web Reconnaissance
    • Recon
    • Port Scanning
    • Privilege escalation
      • File permissions
      • Service Exploits
      • Kernel Exploits
      • Privilege Checker
      • snapd
      • SUID
      • Splunk
    • Reverse Shell
      • PHP deserialization
    • PHP
    • Exploits & Footholds
      • Exploit Mindmap
  • Checklist (CTF targetted)
    • checklist
  • Malicious payload
    • Metasploit APK
Powered by GitBook
On this page
  1. Passive Information Gathering
  2. Techniques

Website Recon

"KNOW YOUR ENEMY, KNOW HIS SWORD." - MIYAMOTO MUSASHI

An attacker with more information will likely have a high chance of succeeding in an attack and gathering as much information as we can without being detected by the target is a key aspect of web recon.

Since reconnaissance is an essential part of security as a whole, be it red-teaming, security engineering or pen-testing.

Which is why Tools & techniques of information gathering/Recon is very fundamental.

PreviousGoogle HackingNextWR with Python

Last updated 4 years ago