INCOMPLETE NOTE STFU IM TOO LAZY TO FINISH TS
Recon:
- you accumulate as much information about the target as you can in this stage
- two main ways you can do this:
- Passive recon:
- its just collecting publicly available information
- some examples of ways, tools and sites to do it with:
- dorking
- exploitDB
- whois domainName
- nslookup domainName
- dig domainName
- social media profiles
- website data
- Active recon:
- its basically directly interacting with the target system, for example by sending network packets and probing for open services
- some examples of this too:
- subdomain enumeration (crt.sh can be used to get the subdomains without actively interacting with the target)
- wappalyzer (shows the tech stack of the site you visit)
- example: (for esp32io)

- nmap
- rustscan
- whatweb (similar to wappalyzer)
- netcat
Enumeration and scanning:
- tools we can use:
- nikto vuln scanning as well
- nmap for port scanning and seeing what services are running plus determining the OS version as well
- nessus for vuln scanning
- burp (its mainly a proxy used in the exploitation phase tbh but kinda fits here ig)
- other stuff to try:
- DNS queries
- limited scans to understand network topology ig
Exploitation:
Maintaining access:
Covering tracks: