Day 33 – Information Gathering | Complete Beginner Guide
🕵️ Day 33: Information Gathering (Reconnaissance)
Bug hunting ka sabse pehla step hota hai:
Target ke baare me maximum information collect karna.
Is process ko kehte hain Information Gathering ya Recon (Reconnaissance).
Agar aap bina information ke direct attack karte ho, to success chances kam hote hain.
Professional bug hunters hamesha recon se start karte hain.
🎯 Information Gathering Kya Hota Hai?
Information Gathering ka matlab hai:
✔ Target website ke baare me data collect karna
✔ Technologies identify karna
✔ Subdomains find karna
✔ Open ports aur services samajhna
✔ Publicly available data analyze karna
Ye sab legal aur authorized scope ke andar hi karna chahiye.
🧠 Recon Kyu Important Hai?
Socho aapko ek company test karni hai.
Agar aapko pata hi nahi:
Kitne subdomains hain
Kaun si technologies use ho rahi hain
Kaun se login panels available hain
To vulnerability find karna mushkil ho jayega.
Recon = Foundation of Bug Hunting 🔥
🌓 Types of Information Gathering
1️⃣ Passive Recon
Isme aap target ke server ko directly touch nahi karte.
Sources:
Google search
Public records
WHOIS lookup
Job postings
Social media
Example:
Agar kisi company ka LinkedIn page dekh kar aapko pata chale ki wo PHP use kar rahi hai, to ye passive recon hai.
Example organization:
LinkedIn
2️⃣ Active Recon
Isme aap directly target system se interact karte ho.
Example:
Subdomain scanning
Port scanning
Directory brute force
API endpoint testing
Yaha permission hona zaruri hai.
🔎 Information Gathering Me Kya-Kya Collect Karte Hain?
1️⃣ Domain Information
Main domain
Subdomains
WHOIS data
2️⃣ Technology Stack
Frontend language
Backend language
Database type
Server type
3️⃣ Open Ports & Services
HTTP (80)
HTTPS (443)
SSH (22)
4️⃣ Hidden Directories
/admin
/login
/backup
🌐 Real-World Example
Maan lo aap kisi company ka program test kar rahe ho, jaise:
Recon me aap check karoge:
✔ Kitne subdomains hain
✔ Kaun si APIs public hain
✔ Kaun si services expose hain
✔ Kaun se endpoints sensitive lag rahe hain
Phir aap attack surface identify karte ho.
🛠 Information Gathering Tools (Basic Level)
✔ Browser DevTools
✔ Google Dorking
✔ WHOIS lookup
✔ Subdomain finder tools
✔ Network scanning tools
(Always authorized environment me hi use karein)
🧩 Recon Process Step-by-Step
Target scope samjho
Domain & subdomains collect karo
Technologies identify karo
Endpoints list banao
Attack surface map karo
Phir vulnerability testing start hoti hai.
⚠ Common Mistake Beginners Karte Hain
❌ Direct exploitation start kar dena
❌ Scope check na karna
❌ Documentation maintain na karna
Professional bug hunters har cheez document karte hain.
🧠 Think Like a Researcher
Har page par ye socho:
Yaha kaun si technology use ho rahi hai?
Kya koi hidden API hai?
Kya koi backup file exposed hai?
Kya koi debug page visible hai?
Information gathering me patience sabse important hai.
🔁 Revision Points
Information Gathering = Recon
Passive aur Active dono types hote hain
Recon bug hunting ka first step hai
Scope follow karna mandatory hai
Documentation important hai