Reconnaissance
Category: General / Pre-Engagement MITRE ATT&CK: Reconnaissance — TA0043 Related: Network Scanning, Social Engineering, Phishing, Vulnerability Assessment
Overview
Reconnaissance is the first phase of any offensive engagement. The goal is to collect as much information as possible about the target — infrastructure, personnel, technologies, and exposed attack surface — without triggering defenses. It is divided into passive (no direct contact with target) and active (direct interaction) sub-phases.
How It Works
Passive Reconnaissance
No packets touch the target’s infrastructure directly.
- OSINT from public sources: WHOIS, DNS records, certificate transparency logs, Shodan, Censys
- Social media profiling (LinkedIn for org chart, GitHub for code leaks, job postings for tech stack)
- Google dorking (
site:,filetype:,inurl:,intitle:) - Historical data: Wayback Machine, PassiveDNS, VirusTotal passive DNS
Active Reconnaissance
Direct interaction with target systems.
- DNS enumeration (zone transfers, brute-force subdomains)
- Port scanning and service fingerprinting
- Web crawling and directory brute-force
- SMTP user enumeration
Attack Methodology
- Define scope and objectives.
- Passive: enumerate domains, IPs, ASNs, emails, employees, technologies.
- Map the external attack surface (subdomains, cloud assets, exposed services).
- Identify high-value targets: VPNs, mail servers, web apps, remote access portals.
- Active: scan in-scope IPs, fingerprint services, enumerate web content.
- Feed findings into vulnerability assessment and exploitation phases.
Detection & Evasion Notes
- Passive recon is invisible to the target.
- Active scanning generates logs (firewall, IDS, web server).
- Evasion: slow scans (
nmap -T1), decoy IPs, scan from multiple sources, rotate user-agents for web requests. - Certificate transparency monitoring (crt.sh) reveals subdomains without touching the target.
Tools
amass— subdomain enumeration (passive + active)theHarvester— emails, subdomains, IPs from public sourcesshodan/censys— internet-wide banner scanning databasessubfinder— fast passive subdomain discoverydnsx— DNS resolution and brute-forcehttpx— HTTP probing of discovered hostsrecon-ng— modular OSINT frameworkmaltego— graphical link-analysis OSINT
References
- PTES Technical Guidelines — Pre-Engagement section
- MITRE ATT&CK TA0043 Reconnaissance (2023)
