1. External Initial Access

Unauthenticated attacker with no access to the domain or internal network

Objectives

graph TD
    A[Start] --> B[Collect OSINT]
    B --> C[Subdomain Enumeration]
    B --> D[User & Email Discovery]
    B --> E[ASN/IP Enumeration]
    B --> F[Public Git & Paste Dumps]
    B --> G[Google Dorking]
    C --> H[Find Login Portals or Services]
    D --> H
    E --> H
    F --> H
    G --> H
    H --> I[Target for Access or Password Spray]

Reconnaissance Techniques

Technique Tool/Source Notes
Subdomain Enumeration dnscan, fierce, amass Internal naming conventions, DNS structure
Passive DNS crt.sh, dnsdumpster, shodan Certificate transparency and public exposure
Email/User Discovery hunter.io, LinkedInt, theHarvester Emails, usernames, OSINT profiles
ASN/IP Discovery whois, asnmap, bgp.he.net Find public IPs assigned to target org
Breach Dumps dehashed, haveibeenpwned, snusbase Stolen credentials tied to target domain
GitHub Secrets Search truffleHog, GitLeaks, GitHub search API keys, secrets, and passwords in public repos
Google Dorking Manual / tools "site:domain.com" inurl:login, "filetype:pdf"

Common Targets