Introduction
As most in the industry would tell you, the reconnaissance and fingerprinting process is really the make-or-break time in most engagements. You’ve got to sneak around like a ninja and gather as much information as possible without setting off any alarms in order to formulate what would be a malicious actor’s (and your) most likely course of action.
The majority of the tools in on this page can be leveraged and practiced with minimal or no setup. At most you may find a Kali Linux VM or WSL helpful.
Illustrated Overview
‣
Organizational Reconnaissance (Technical)
‣
Organizational Reconnaissance (Personnel)
‣
Threat Intelligence
‣