Domain Information
Start by mapping the organization’s public footprint from a black-box perspective.Results in labs and real engagements will differ. Use these examples as a
methodology reference, not as exact expected output.
Online Presence
Useful first-pass sources:- TLS certificates (main domain and SANs)
- Certificate Transparency logs (
crt.sh) - DNS records (
A,MX,NS,TXT,SOA)
- certificate validity period
- SAN entries (
www,support,api, etc.) - issuer/provider patterns across subdomains
Company-Hosted vs Third-Party Hosts
Distinguish infrastructure you are allowed to test from third-party assets.DNS Records
A: domain-to-IP mappingsMX: email provider pathNS: hosting/provider hintsTXT: verifications + email security controls (SPF,DMARC,DKIM)SOA: zone authority metadata
| Clue Type | Why It Matters |
|---|---|
| Atlassian / Google / Outlook / Mailgun / LogMeIn | Reveals core business stack and third-party trust boundaries |
| SPF IPs in TXT records | Can expose additional infrastructure IPs |
| NS provider names | Helps infer DNS/hosting architecture |
Cloud Resources
Cloud platforms (AWS, Azure, GCP) are standard, but tenant-side misconfiguration can expose data. Common exposure targets:- AWS S3 buckets
- Azure Blob storage
- GCP Cloud Storage
Discovery Paths
- DNS/host outputs that reveal cloud endpoints
- Search indexing of public cloud files
- Website source code referencing cloud assets
- Third-party domain/cloud enrichment platforms
Practical Workflow
- Collect candidate storage endpoints passively.
- Pivot with company names and known abbreviations.
- Filter by file type and recency.
- Build a prioritized validation list inside scope.
- bucket/container naming conventions
- environment labels (
dev,prod,backup,archive) - file extensions (
.pdf,.docx,.zip,.json,.pem,.key)
Risk Signal
Operational pressure often causes accidental public exposure of sensitive files. Real-world examples include exposed key material, internal documents, or config exports in cloud storage indexes.Staff
Employee OSINT helps infer technology stack, delivery model, and security maturity. Primary sources:- LinkedIn/Xing profiles
- public job postings
- public repositories and shared technical content
Job Post Intelligence
Job requirements can quickly reveal probable stack components:- languages: Java, C#, C++, Python, Ruby, PHP, Perl
- databases: PostgreSQL, MySQL, SQL Server, Oracle
- frameworks: Flask, Django, Spring, ASP.NET MVC
- tooling: Git/SVN/Perforce, Atlassian suite, CI/CD
- collect languages and framework requirements
- map likely backend and data layers
- identify CI/CD and collaboration tooling
- infer probable attack surface families (web, API, auth, data)
Profile and Repository Signals
Common recon value:- framework preferences (front-end/back-end)
- architecture patterns and domain focus
- public code quality and accidental metadata leakage
- explicit mentions of React/Svelte/Angular/Flask/Django/etc.
- links to personal or org repositories
- project descriptions tied to internal systems (CRM, broker portals, analytics)
- personal/work email leakage
- hardcoded secrets/tokens in shared code
- sensitive internal context in project artifacts
- personal email addresses reused in commits
- copied secrets/tokens in sample code
- verbose stack traces or configuration fragments in public snippets
Search Strategy
When your goal is infrastructure mapping, prioritize profiles from:- engineering/development
- platform/infrastructure
- security/operations
- prioritized employee-role list
- inferred technology stack map
- tooling/provider dependency map
- potential social-engineering and credential-risk observations for reporting