Reconnaissance
Intelligence gathering is the foundation of any successful penetration test. The more you know about your target, the more effective your attacks will be.
🔍 Why Reconnaissance Matters
💡 Pro Tip: Spend 30-40% of your engagement time on reconnaissance - thorough recon dramatically increases success rates in later phases.
📚 Reconnaissance Guides
Explore in-depth guides for each reconnaissance technique. Each guide includes tools, techniques, examples, and practical exercises.
Passive Reconnaissance
OSINTOSINT fundamentals, WHOIS analysis, DNS enumeration, certificate transparency logs, Google dorking, Shodan/Censys, and leaked credential discovery.
Subdomain Discovery
EnumerationPassive sources (CT logs, SecurityTrails), DNS brute-forcing, permutation discovery, automation pipelines, and subdomain takeover detection.
Active Reconnaissance
ActiveTechnology fingerprinting, web crawling, JavaScript analysis, screenshot capture, service detection, and automated enumeration pipelines.
🛠️ Essential Reconnaissance Tools
Reconnaissance Workflow
✅ Quick Checklist
Ensure you've completed reconnaissance across all categories:
- ☐ WHOIS analysis
- ☐ DNS enumeration
- ☐ CT log subdomains
- ☐ Google dorking
- ☐ Passive sources
- ☐ DNS brute-forcing
- ☐ Permutation scanning
- ☐ Takeover detection
- ☐ Tech fingerprinting
- ☐ Web crawling
- ☐ JS analysis
- ☐ Screenshot capture
Next Steps