### <mark style="color:green;">Who We Are</mark>: Introducing [CipherOps](https://cipherops.tech/)
4
10
5
11
At CipherOps, we are a team of dedicated professionals passionate about cybersecurity and protecting your digital assets. With a strong focus on providing comprehensive and reliable security solutions, we strive to stay ahead of the ever-evolving threats in the digital landscape.
<figure><img src="../../.gitbook/assets/image (9).png" alt="Active Subdomain Enumeration Using FFUF"><figcaption><p>Active Subdomain Enumeration Using FFUF</p></figcaption></figure>
22
+
<figure><img src="../../.gitbook/assets/image (4).png" alt="Active Subdomain Enumeration Using FFUF"><figcaption><p>Active Subdomain Enumeration Using FFUF</p></figcaption></figure>
23
23
24
24
<mark style="color:green;">Technique 2:</mark> Favicon Hashes Favicons, the icons representing your website, possess unique hash values that can aid in discovering domains sharing the same hash function. Use the FavFreak tool to calculate favicon hashes. Execute the following command:
25
25
skipped 1 lines
27
27
Command: cat urls.txt | python3 favfreak.py
28
28
```
29
29
30
-
<figure><img src="../../.gitbook/assets/image (5).png" alt="Favicon hash detecting using FavFreak"><figcaption><p>Favicon hash detecting using FavFreak</p></figcaption></figure>
30
+
<figure><img src="../../.gitbook/assets/image (1).png" alt="Favicon hash detecting using FavFreak"><figcaption><p>Favicon hash detecting using FavFreak</p></figcaption></figure>
31
31
32
32
Once the hash is calculated, you can use the same on internet search engines such as **shodan** to get the mass websites.
33
33
skipped 7 lines
41
41
command: cat subdomains.txt | dnsx -a -resp-only | nrich -
42
42
```
43
43
44
-
<figure><img src="../../.gitbook/assets/image.png" alt="Using shodan Search Engine to detect site that have same favicon hashed"><figcaption><p>use a nrich tool to check out the subdomains </p></figcaption></figure>
44
+
<figure><img src="../../.gitbook/assets/image(6).png" alt="Using shodan Search Engine to detect site that have same favicon hashed"><figcaption><p>use a nrich tool to check out the subdomains </p></figcaption></figure>
45
45
46
46
<mark style="color:green;">Technique 4:</mark> Choosing the Right Target When dealing with applications that have numerous subdomains, selecting the right subdomain to start hunting can be challenging. Utilize the interesting subs gf pattern list to identify interesting subdomains worth investigating. Execute the following command:
47
47
skipped 19 lines
67
67
Command: cat dorks.txt | uncover
68
68
```
69
69
70
-
<figure><img src="../../.gitbook/assets/image (6).png" alt=""><figcaption><p>uncover tool link <a href="https://github.com/projectdiscovery/uncover">https://github.com/projectdiscovery/uncover</a></p></figcaption></figure>
70
+
<figure><img src="../../.gitbook/assets/image (10).png" alt=""><figcaption><p>uncover tool link <a href="https://github.com/projectdiscovery/uncover">https://github.com/projectdiscovery/uncover</a></p></figcaption></figure>
71
71
72
72
73
73
skipped 11 lines
85
85
Command: naabu -host target.com
86
86
```
87
87
88
-
<figure><img src="../../.gitbook/assets/image (4).png" alt=""><figcaption><p>Finding open ports and service running using naabu</p></figcaption></figure>
88
+
<figure><img src="../../.gitbook/assets/image (9).png" alt=""><figcaption><p>Finding open ports and service running using naabu</p></figcaption></figure>
89
89
90
90
:clap:Thank you for taking the time to explore these amazing reconnaissance techniques. :smile:We hope you found this blog informative and useful in your endeavors.
* Key focus: Comprehensive notes on mastering the art of information gathering through reconnaissance techniques.
11
11
12
-
### Table of Contents:
12
+
### <markstyle="color:green;">Table of Contents</mark>:
13
13
14
14
1. What is Reconnaissance?
15
15
2. Passive Reconnaissance Techniques
skipped 29 lines
45
45
* Documentation and Reporting
46
46
9. Conclusion
47
47
48
-
### Summary and Key Takeaways:
48
+
### <markstyle="color:green;">Summary and Key Takeaways:</mark>
49
49
50
50
* Reconnaissance is the process of gathering information to gain insight into a target system or organization.
51
51
* Passive techniques involve collecting publicly available data without directly interacting with the target.
skipped 5 lines
57
57
* Adhering to legal and ethical guidelines is crucial during reconnaissance activities.
58
58
* A structured methodology and proper documentation enhance the effectiveness of reconnaissance efforts.
59
59
60
-
### Conclusion
60
+
### <mark style="color:green;">Conclusion</mark>
61
61
62
62
Reconnaissance serves as the foundation for successful information gathering in the field of cybersecurity. By understanding the various techniques and tools available, security professionals can gain valuable insights into their targets. However, it is essential to remember the importance of legal and ethical considerations when conducting reconnaissance activities. With a comprehensive approach and proper documentation, the art of reconnaissance can be mastered, leading to more effective cybersecurity strategies.
> A collection of awesome one-liner scripts especially for bug bounty.
6
6
7
7
This repository stores and houses various one-liner for bug bounty tips provided by me as well as contributed by the community. Your contributions and suggestions are heartily♥ welcome.
8
8
9
-
### Definitions
9
+
### <mark style="color:green;">Definitions</mark>
10
10
11
11
This section defines specific terms or placeholders that are used throughout one-line command/scripts.