361 words
2 minutes
Introduction

Web Reconnaissance: The First Step in Penetration Testing#

Web reconnaissance is the foundation of any thorough security assessment. It involves collecting critical information about a target website or web application before diving into deeper analysis or exploitation. Think of it as digital detective work—it helps identify weaknesses and entry points before any attack is even launched.

Objectives of Web Reconnaissance#

  1. Identifying Assets
    • Discover web pages, subdomains, IPs, and technologies used.
    • Gain a full picture of the target’s online presence.
  2. Discovering Hidden Information
    • Locate exposed backup/config files or internal documents.
    • These can unintentionally leak sensitive data.
  3. Analysing the Attack Surface
    • Spot vulnerabilities by understanding tech stacks and misconfigurations.
  4. Gathering Intelligence
    • Collect info that can aid in further exploitation (e.g., employee names, emails).

Both attackers and defenders use reconnaissance:

  • Attackers to find weaknesses.
  • Defenders to fix them first.

Types of Reconnaissance#

Recon is typically divided into two categories:

Active Reconnaissance#

This involves direct interaction with the target—more effective but riskier as it may trigger alerts.

TechniqueDescriptionExample ToolsRisk
Port ScanningFinds open ports and running servicesNmap, Masscan🔺 High
Vulnerability ScanningProbes for known flaws (e.g., XSS, SQLi)Nessus, Nikto🔺 High
Network MappingMaps target’s network pathTraceroute, Nmap🔺 Medium–High
Banner GrabbingReads service banners for software/versionNetcat, curl🔸 Low
OS FingerprintingDetects the target’s operating systemNmap (-O), Xprobe2🔸 Low
Service EnumerationIdentifies exact versions of servicesNmap (-sV)🔸 Low
Web SpideringCrawls website for structure, hidden filesBurp Suite Spider, OWASP ZAP🔸 Medium

Pros: Detailed info

Cons: High chance of detection

Passive Reconnaissance#

This technique gathers information without touching the target directly. It’s stealthy but may yield limited data.

TechniqueDescriptionExample ToolsRisk
Search Engine QueriesGoogle-fu to find data on targetGoogle, ShodanVery Low
WHOIS LookupsReveals domain ownership infoWHOIS toolsVery Low
DNS AnalysisIdentifies subdomains and mail serversdig, dnsreconVery Low
Web Archive AnalysisExamines old versions of sitesWayback MachineVery Low
Social Media AnalysisOSINT via LinkedIn, Twitter, etc.LinkedIn, FacebookVery Low
Code RepositoriesChecks GitHub for exposed code or secretsGitHub, GitLabVery Low

Pros: Undetectable

Cons: Limited to publicly available data

Starting Point: WHOIS#

The WHOIS protocol helps identify:

  • Domain registrant details
  • Contact info
  • Name servers
  • Expiry and creation dates

Understanding WHOIS gives you a good grasp of who owns the domain and how it’s structured, making it a crucial first step in reconnaissance.

Summary#

  • Web reconnaissance = digital footprint discovery
  • It is vital for both attackers (to exploit) and defenders (to secure)
  • Comes in two flavors: Active (direct, riskier) and Passive (indirect, stealthy)
  • Tools like Nmap, WHOIS, Shodan, Burp Suite, and GitHub play a key role
  • Mastering recon sets the stage for all further penetration testing phases
Introduction
https://fuwari.vercel.app/posts/introduction/
Author
Ranjung Yeshi Norbu
Published at
2025-04-21