Lecture on Recon Methodology in Bug Bounty and Red Teaming
Introduction
Speaker Location & Setup: Presenting from a hotel in Colorado, apologies for any Wi-Fi issues.
Reason for Travel: Speaker's son's birthday.
Lecture Focus: Recon methodology in both bug bounty and red team activities.
Speaker Background: Transitioned from exclusive bug bounty hunting to a hybrid role including red teaming.
Major Themes
Recon Methodology: Continuous update and refinement to emulate real adversaries.
Audience: Bug Bounty hunters, red teamers, penetration testers.
Presentation Outline: Topics covering asset discovery, ASN tracking, scoping, cloud reconnaissance, new tools and methodologies.
Recon Methodology Overview
Full Day One Course Outline: Introduction to recon, scoping, ASN tracking, Showdown, acquisitions, cloud reverse WHOIS, linked analysis, new red team-specific updates.
Focus Areas: Critical aspects of reconnaissance and new tools.
Autonomous System Numbers (ASN)
Objective: Identify all assets of a company, including IP spaces and domains.
Tools and Techniques:
Hurricane Electric's BGP Data: Use to find ASN and their IP prefixes.
Manual Verification: Avoid automation to prevent inaccurate results.
ASN Map and Nabu: Tools for finding and port scanning IP ranges.
Full Workflow: Command examples for manual IP and port scanning.
Cloud Reconnaissance
Purpose: Identify company assets hosted in the cloud, particularly for companies without their own IP space.
Key Tools and Techniques:
SSL Certificate Analysis: Using Cloud Recon to scrape and parse cloud IP ranges for certificate data.
Command Line Workflow: Utilize bash scripts for parsing SSL data to find domains and subdomains.
Hack IP to Host: Uses SSL certificates and reverse DNS lookup for deeper asset discovery.
Advanced Recon Using Showdown
Purpose: Passive information gathering without alerting the target.
Key Tools and Techniques:
Showdown Queries and Dorks: Utilize Showdown search syntax effectively.
Karma V2 Tool: Showdown API wrapped tool for auto Recon, outputs potential vulnerable targets.
Show SubGo: Effective for subdomain enumeration.
Inspiration for Dorks: Staying updated via online resources and Twitter.
Additional Points
Tool Discussion: Compared standalone tools with integrated ones for better specialized functionality.
Combination of Manual and Automated Methods: Importance of manual checking along with automated Recon steps.
Extensions and Automation
Browser Extensions:
Bulk URL Opener: For efficient subdomain testing.
BuiltWith and Wappalyzer: Identify front-end technologies.
Burp Suite Extensions:
Gap by xnl-hacker: For parsing JavaScript.
JS Beautifier: For prettifying and analyzing complex JS.
Q&A
during Q&A session:
PowerPoint Availability: Will provide slides post-lecture.
Prioritizing Manual vs Automated Tests: Describing when to switch from automated scripts to manual penetration testing.
General Advice: Utilize specialized tools for specific tasks, stay updated with new tools and techniques.