Series on Hacker Logic, Part One: How Hackers Do Reconnaissance on Organizations

Screenshot from OSINT.
  • Social recon involves examining the human element: how many employees, how do they interact with work online, where they are based, and who’s a good phishing target.
  • Tech recon is an audit of the software and hardware that makes up the tech stack and environment that’s accessible from the internet.

Build a company blueprint with Google

Social recon: Publicly available employee portals

Employee portal found with a Google search. With a little digging and password reset, I’m in.
Publicly available employee portal login page.

Social engineering new “friends”

Social engineering sounds harder than it really is. A simple Facebook scroll and you’re finding answers to banking questions.

Tech recon: Finding the easiest target in the attack surface

  • How well do I know and understand the asset on the attack surface?
  • Is there a known vulnerability? If so, how easy would it be to build an exploit?
  • If I get in, how easy will it be to escalate privileges?
  • Is this something that might trigger monitoring, or can I go undetected?
  • Is this piece of technology known to be buggy?
  • Do I already have an exploit I can use?

Your move




moose. co-founder @randori. red-teamer. security can’t be fixed. practice how you fight.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

10 days after crowdsale

Big data under threat, new vulnerability in Apache Cassandra

{UPDATE} Trucker Parking Reloaded 2016 Hack Free Resources Generator

Why you shouldn’t delete your data until you’ve thought about your digital history

HyperDAO: The Importance of DAO Governance

{UPDATE} Doodle Basketball 2 Hack Free Resources Generator

Cybersecurity Statistics, Predictions, and Solutions for 2021

{UPDATE} 街坊雀神 Hack Free Resources Generator

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
David Wolpoff (moose)

David Wolpoff (moose)

moose. co-founder @randori. red-teamer. security can’t be fixed. practice how you fight.

More from Medium

LeetCode 10. Regular Expression Matching, Dynamic Programming Edition


Error 1: Your cloud security might be broken; wait in the “cue” for help

Thinkium adopts a hierarchical multi chain system architecture, with high scalability, high…

What is Relative Strength and how to use it to generate trade ideas?