Overview
External reconnaissance is the process of discovering everything a company owns that is publicly accessible on the internet — before touching any target system. The goal is to build a complete picture of the attack surface.Asset Discovery
Acquisitions
Start by finding all companies owned by the main company (subsidiaries expand scope):- Crunchbase — search company → click “acquisitions”
- Wikipedia — search the company’s page for acquisition history
- SEC/EDGAR filings and investor relations pages (for public companies)
- OpenCorporates and the GLEIF LEI database
ASNs (IP Ranges)
An Autonomous System Number (ASN) identifies an organization’s IP ranges. Find them by company name, IP, or domain:- bgp.he.net
- bgpview.io
- ipinfo.io
- Regional registries: AFRINIC, ARIN, APNIC, LACNIC, RIPE NCC
Domains
Reverse DNS
Reverse Whois
Search for other assets linked to the same organization name, address, or email:- viewdns.info/reversewhois — Free
- reversewhois.io — Free
- whoxy.com — Free web, paid API
- DomLink — Automation tool
Trackers & Favicon Hashes
Find related domains by sharing the same Google Analytics ID, Adsense ID, or favicon hash:Certificate Transparency
Discover domains via CT logs:Subdomains
OSINT Tools
DNS Brute Force
Permutation Generation
Generate subdomain mutations to find more targets:Virtual Host Brute Force
Fuzz theHost header to find hidden vhosts:
IPs, Web Servers, and Cloud Assets
Collect All IPs
Gather IPs from discovered ranges, domains, and subdomains. Check SecurityTrails for historical IP records to find CloudFlare bypass IPs.
Port Scan Non-CDN IPs
Run port scans against IPs not belonging to CDNs to find running services. Check each service against this book’s guides.
Screenshot All Web Servers
Take screenshots to get a quick visual overview of discovered web apps.Tools: EyeWitness, Gowitness, Aquatone
Search Cloud Assets
Use company keywords and wordlists to find open S3 buckets, cloud functions, and storage:Tools: cloud_enum, CloudScraper, S3Scanner
Emails, Credential Leaks, and Secret Leaks
Email Discovery
- theHarvester
- hunter.io (free version)
- snov.io (free version)
- minelead.io (free version)
Credential Leaks
- leak-lookup.com
- dehashed.com
- Leakos + gitleaks for GitHub repos
GitHub Leaks
Search public repos of the company and its developers for exposed credentials and API keys.
Google Dorks
Use the Google Hacking Database or tools like Gorks to automate dork searches.
Full Recon Automation Tools
Checklist Summary
By the end of external recon you should have:
- All companies inside the scope
- All assets belonging to those companies (with basic vuln scans if in scope)
- All domains belonging to the companies
- All subdomains (check for subdomain takeovers!)
- All IPs from CDN and non-CDN sources
- All web servers with screenshots (anything weird?)
- Potential public cloud assets
- Emails, credential leaks, and secret leaks