Gathering Information from Servers with OSINT Tools
This chapter will introduce you to the modules that allow extracting information from publicly exposed servers using Open Source Intelligence (OSINT) tools. The information collected, such as a domain, a hostname, or a web service, will be very useful while carrying out the pentesting or audit process.
We will review tools like Google Dorks, SpiderFoot, dnspython, DNSRecon, and other tools for applying fuzzing processes with Python. OSINT reconnaissance and application fuzzing have different purposes. OSINT is typically a passive exercise aimed at gathering information that can then be leveraged for attacks, while fuzzing consists of automated injection attacks. At this point, we could use OSINT techniques to help focus fuzzing / automated attacks.
The following topics will be covered in this chapter:
- The basics concepts of OSINT
- Google Dorks queries to get information about the target domain
- Getting...