Afi-Gather Any Information With Our Gun

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 19

GATHER ANY INFORMATION

WITH OUR GUN


No world is safe !!!
It’s about digital world, we will present it
properly
TABLE OF CONTENTS

01 Information Gathering

02 Purpose of Information Gathering

03 Information Gathering Techniques

04 SUDOMY
“There will be a lot of information which
people upload, save, and delete, but it will be
recovered or sometimes gathered.”
一Anonymous
01
Information Gathering
Information is power
Information Gathering
the first step to take during the
earlier stages of any hacking
activity (both cracking and ethical
hacking), when any black or white
hat researcher needs to gain as
much information as possible
about the desired target.
The Hacktivity is
the meaning of
taking creativity
in our life
Hack is not a crime absolutely.
Because hack is the kind of
activity for make our life simple
and creative then it changes the
normal life for the amazing life in
a minute that we can feel it being
awesome
02
Purpose of Information Gathering
See what I see, and you can’t see
what I do
What are the objectives of information gathering in
cybersecurity?
Any basic cybersecurity information gathering process often includes these two
types of data collection goals:

● Collecting network data: Such as public, private and associated domain


names, network hosts, public and private IP blocks, routing tables, TCP and
UDP running services, SSL certificates, open ports and more.
● Collecting system-related information: This includes user enumeration,
system groups, OS hostnames, OS system type (probably by fingerprinting),
system banners, etc.
Your privacy is safe, but your information is
sold both free and premium
Unconscious Privacy Mistake

Giving name, username, They start trying the


and several information online social tools
to the Internet
DAY 1
Hacker does recon using
a clue / access that he Let’s go fishing our
have been collected/got data
first
DAY 3
DAY 2 DAY 4
03
Information Gathering Techniques
This is magic tricks that i spoil to you
INFORMATION GATHERING TECHNIQUES

SOCIAL ENGINEERING SEARCH ENGINES SOCIAL NETWORKS


This includes in-person chat, we can see about The great sources for
phone conversations and email personal/enterprise data or publishing information
spoofing attacks. information from Surfing

DOMAIN NAME INTERNET SERVER


point for investigation of authoritative DNS servers are a
Organization, company, or great source of information, as
country they often include every single
surface point exposed to the
Internet
04
SUDOMY
Subdomain Enumeration and
Analysis Tool
FEATURES OF SUDOMY

● Easy, Light, Fast, and Powerful


● Active and Passive Method
● Collected subdomain testing
● Subdomain availability Testing
● Virtualhost Detection Ability
● Port Scanning
● Subdomain TakeOver Attack Testing
● Subdomain screenshot
● Report output in HTML or CSV Format
ACTIVE METHOD

It utilize Gobuster tools


because of its highspeed
performance in carrying out
DNS Subdomain Bruteforce
attack (wildcard support). The
wordlist that is used comes
from combined SecList
(Discover/DNS) lists which
contains around 3 million
entries
https://dnsdumpster.com
PASSIVE METHOD https://web.archive.org
https://shodan.io
https://virustotal.com
Collecting data from several https://crt.sh
third party websites. https://www.binaryedge.io
https://securitytrails.com
https://sslmate.com/certspotter
https://censys.io
https://threatminer.org
http://dns.bufferover.run
https://hackertarget.com
https://www.entrust.com/ct-search/
https://www.threatcrowd.org
https://riddler.io
https://findsubdomains.com
THANKS!
Does anyone have any questions?

You might also like