Perform Information Gathering using Following Tools on the Given Targets-Cyber Sapiens Internship Task-3
Hello guys👋👋 ,Prajit here from the BUG XS Team and Cyber Sapiens United LLP Cybersecurity and Red Team Intern, in this I am regularly given some interesting tasks, In my third task, I was given 3 targets and had to perform information gathering via the tools given. So let’s get to it.
Tool-1: Whois
Summary: Whois Lookup is done to get whois information of a domain which consists of record, like who owns the domain, how to contact them and their registrar information, date when it was issued, etc. For this you can use https://whois.domaintools.com/ to get this information.



Tool-2: Shodan
Summary: Shodan is the search engine for everything on the internet. While Google and other search engines index only the web, Shodan indexes pretty much everything else — web cams, water treatment facilities, yachts, medical devices, traffic lights, wind turbines, license plate readers, smart TVs, refrigerators, anything and everything you could possibly imagine that’s plugged into the internet. This is one of the best search engine to find readily vulnerable devices related to our target. The website is https://www.shodan.io/.



Tool-3: Wappalyzer
Summary: This is an extension available on browsers, and also one of the important extension for security professionals. It lists out the web technologies available on any website you visit.



Tool-4: Dirb
Summary: This tool is a Web content scanner. This basically fuzzes the endpoint of url path for different paths and directories, which generally lead to content discovery and sometimes sensitive information disclosure vulnerabilities too.



Tool-5: Nmap
Summary: Nmap is a free and open source tool mostly used for vulnerability scanning and network discovery.It is also used to identify the devices running on the local network, discovering services on some of the ports that they have opened and also discovering what version of software they are running on the open ports.You can use different type of protocol in nmap that are TCP, UDP, etc.



Tool-6 : Paramspider
● Summary: This tool is used for enumerating parameters for the domains. It also helps to get hidden parameters.



This is all for today’s writeup.
Thanks For Reading 😊
Profile Links:
Twitter: https://twitter.com/PrajitSindhkar?s=08
LinkedIn: https://www.linkedin.com/in/prajit-sindhkar-3563b71a6/
Instagram: https://instagram.com/prajit_01?utm_medium=copy_link
BUG XS Official Website: https://www.bugxs.co/