Member-only story

Tools to Perform Reconnaissance the Legal Way | OSINT

Passive Information Gathering Technique

K O M A L
InfoSec Write-ups
3 min readDec 21, 2020

Note: Although some passive tools mentioned in this article are completely legal to use, it could still go against some organisation’s policy. Therefore always ensure you have their consent before attempting any reconnaissance.

https://divadilemma.wordpress.com/2012/08/23/diva-detective/

Open Source Intelligence (OSINT) is a collection of data of an individual or an organisation that are publicly available in the public domain and Internet.

OSINT is used during the early Reconnaissance Phase in Cyber Kill Chain.

Stages of Reconnaissance:

  1. Footprinting - Passive Reconnaissance
  2. Scanning - Active Reconnaissance
  3. Enumeration - using passive+active result to get more information to understand the scale of the attack surface.

Here, I will primarily be focusing on the Footprinting Activity that can be legally performed.

Create an account to read the full story.

The author made this story available to Medium members only.
If you’re new to Medium, create a new account to read this story on us.

Or, continue in mobile web

Already have an account? Sign in

Published in InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

No responses yet

Write a response