Passive Reconnaissance
Passive Reconnaissance
Passive reconnaissance is the process of gathering information about a target without directly interacting with its systems or infrastructure. Unlike active recon, this method is stealthier, making it ideal for red teams, penetration testers, and OSINT researchers aiming to remain undetected.
1. Location-Based Intelligence (Physical Recon)
Understanding the physical environment of a target can offer valuable insight into potential entry points, routines, and vulnerabilities.
Key Information to Collect:
Satellite imagery (e.g., Google Earth, Bing Maps)
Drone footage (if legally permissible)
Building layout including:
Badge readers
Break areas
Fence lines and security checkpoints
Parking lot access and staff entrance
Example Tools:
Public drone videos on YouTube or social media platforms
2. Job & Employee Intelligence (Social Engineering Prep)
Information about employees and organizational structure can assist in crafting phishing emails, pretexting, or badge cloning strategies.
What to Look For:
Names, titles, contact numbers
Manager-employee hierarchy
Photos showing:
ID badges
Computer screens or terminals
Desk setups and internal documentation
Tools & Platforms:
LinkedIn
Hunter.io – for discovering company email formats
Google Dorking – e.g.:
site:linkedin.com/in "Company Name" AND "Analyst" site:facebook.com "XYZ Corp"
3. Web & Host Reconnaissance
Objective: Validate the target and identify entry points in its online presence.
Key Activities:
Discover subdomains and hosting infrastructure
Fingerprint technologies used on web applications
Check for leaked credentials and breaches
Subdomain Enumeration
Identify public-facing subdomains to broaden the attack surface.
Example Tools:
Sublist3rsublist3r -d targetdomain.comcrt.sh(Certificate Transparency logs) Search:%.targetdomain.com
Domain & DNS Intelligence
WHOIS Lookup:
whois targetdomain.comDNS Enumeration with dnsrecon:
dnsrecon -d targetdomain.com -aNslookup:
nslookup targetdomain.comWeb Technology Fingerprinting
Identify the backend tech stack used by the target website.
Tools:
WhatWebwhatweb https://targetdomain.comWappalyzer(browser extension)BuiltWith(https://builtwith.com)
Data Breaches & Credential Leaks
Check if any user accounts related to the target have been exposed.
Tools:
BreachParse– Parses large breach datasetsWeLeakInfo(Note: offline now, was used for leaked credential databases)
4. Port Scanning & Banner Grabbing (Cautious Use)
Though typically considered active, scanning can sometimes be performed in a less intrusive way depending on the method and frequency.
Example using Netcat:
nc -nv targetdomain.com 80You can manually send an HTTP request:
GET / HTTP/1.0Last updated