Internal Active Recon
This guide is intended for internal corporate usage in controlled environments and is noisy on the network. The below code snippets are examples to demonstrate the methodology and remaining organized with the same working directory.
Prerequisites
Directory & Workspace Setup
Attack Surface Assessment Workflow
1. Subdomain & Asset Enumeration
2. Validate & Resolve Assets
3. Port & Service Discovery
4. Vulnerability Assessment
5. Internal Network Mapping (if authorized)
6. Web Technology & Screenshotting
Post-Assessment: File Structure & Organization
Notes and Best Practices
Last updated