10.3. Information Collection

10.3.1. Whois

10.3.2. Website filing

10.3.3. CDN query

10.3.4. Subdomain Blasting

10.3.5. Domain Name Acquisition

10.3.6. Weak Password Blasting

10.3.7. Git information leakage

10.3.8. Github Monitoring

10.3.9. Path and file scanning

10.3.10. Path Crawlers

  • crawlergo A powerful dynamic crawler for web vulnerability scanners

10.3.11. Fingerprint recognition

10.3.12. Waf Fingerprint

10.3.13. Port Scanning

  • nmap

  • zmap

  • masscan

  • ShodanHat

  • lzr LZR quickly detects and fingerprints unexpected services running on unexpected ports

  • ZGrab2 Fast Go Application Scanner

  • RustScan The Modern Port Scanner

  • DNS dnsenum nslookup dig fierce

  • SNMP snmpwalk

10.3.14. DNS data query

10.3.15. DNS Association

10.3.16. Cloud Services

10.3.17. Data query

10.3.18. Password

10.3.19. CI Information Disclosur

  • secretz minimizing the large attack surface of Travis CI

10.3.20. Profile of personal data

  • GHunt Investigate Google Accounts with emails

10.3.21. Mailbox Collection

10.3.22. Others