mirror of
https://github.com/The-Art-of-Hacking/h4cker
synced 2024-11-22 02:43:02 +00:00
adding OSINT resources
This commit is contained in:
parent
9e5d615eba
commit
7bed5b4607
2 changed files with 28 additions and 0 deletions
7
osint/README.md
Normal file
7
osint/README.md
Normal file
|
@ -0,0 +1,7 @@
|
||||||
|
# Open Source
|
||||||
|
|
||||||
|
Open-source intelligence (OSINT) is data collected from open source and publicly available sources. The following are a few OSINT resources and references:
|
||||||
|
|
||||||
|
* [GOSINT](https://github.com/ciscocsirt/gosint) - a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs). GOSINT allows a security analyst to collect and standardize structured and unstructured threat intelligence.
|
||||||
|
* [Awesome Threat Intelligence](https://github.com/santosomar/awesome-threat-intelligence) - A curated list of awesome Threat Intelligence resources. This is a great resource and I try to contribute to it.
|
||||||
|
* [Umbrella (OpenDNS) Popularity List](http://s3-us-west-1.amazonaws.com/umbrella-static/index.html) - most queried domains based on passive DNS usage across our Umbrella global network of more than 100 Billion requests per day with 65 million unique active users, in more than 165 countries.
|
21
useful_commands_and_scripts/dns_recon.md
Normal file
21
useful_commands_and_scripts/dns_recon.md
Normal file
|
@ -0,0 +1,21 @@
|
||||||
|
# DNS Reconnassaince
|
||||||
|
|
||||||
|
## DNSRECON
|
||||||
|
* [dnsrecon](https://github.com/darkoperator/dnsrecon) - DNS Enumeration Script created by Carlos Perez (darkoperator)
|
||||||
|
|
||||||
|
Reverse lookup for IP range:
|
||||||
|
`./dnsrecon.rb -t rvs -i 10.1.1.1,10.1.1.50`
|
||||||
|
|
||||||
|
Retrieve standard DNS records:
|
||||||
|
`./dnsrecon.rb -t std -d example.com`
|
||||||
|
|
||||||
|
Enumerate subdornains:
|
||||||
|
`./dnsrecon.rb -t brt -d example.com -w hosts.txt`
|
||||||
|
|
||||||
|
DNS zone transfer:
|
||||||
|
`./dnsrecon -d example.com -t axfr`
|
||||||
|
|
||||||
|
|
||||||
|
## Parsing NMAP Reverse DNS Lookup
|
||||||
|
|
||||||
|
`nmap -R -sL -Pn -dns-servers dns svr ip range | awk '{if( ($1" "$2" "$3)=="NMAP scan report")print$5" "$6}' | sed 's/(//g' | sed 's/)//g' dns.txt `
|
Loading…
Reference in a new issue