Search Open Websites/Domains (T1593)
1. Social Media
- LinkedIn: Employee roles and tech stack.
- Twitter/X: Engineers complaining about "Azure outages" confirms they use Azure.
- Instagram: Photos of employee badges (cloning risk).
2. Search Engines
- Google Dorking:
site:target.com filetype:pdf "confidential"site:target.com "login"site:pastebin.com "target.com"
3. Code Repositories
GitHub / GitLab / Bitbucket.
- Secrets: API Keys, AWS Access Keys hardcoded in
config.py. - Infrastructure: Terraform files revealing internal IP ranges.
- Tool:
gitrobortrufflehogto scan org repositories.
4. Search Victim-Owned Websites
- Robots.txt: Often lists sensitive directories (
/admin,/backup) that they want to hide from Google. - Sitemap.xml: Map of the entire site structure.