VulnableOne
search
⌘Ctrlk
VulnableOne
  • 🧘‍♂️About Me
  • Offensive Treasure
    • 🧌Penetration Testing
    • 🧙‍♂️AD Attack
    • 🥷Red Team
      • Reconnaissance
        • Active Scanning
          • Scanning IP Blocks
          • Vulnerability Scanning
          • Wordlist Scanning
        • Gather Victim Host Information
        • Gather Victim Identity Information
        • Search Open Websites/Domains
        • Search Victim-Owned Websites
      • Resource Development
      • Execution
      • Persistence
      • Privilege Escalation
      • Defense Evasion
      • Credential Access
      • Lateral Movement
    • spider-webWeb Application
  • Course Review
    • 👨‍🎓Cyber Security Courses Journey
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Offensive Treasurechevron-right
  2. 🥷Red Teamchevron-right
  3. Reconnaissancechevron-right
  4. Active Scanning

Scanning IP Blocks

Adversaries may scan victim IP blocks to gather information that can be used during targeting. Public IP addresses may be allocated to organizations by block, or a range of sequential addresses.

hashtag
Identify AS Number:

LogoHurricane Electric BGP Toolkitbgp.he.netchevron-right

hashtag
Public IP blocks discovery

  • Shodanarrow-up-right

  • Censysarrow-up-right

  • Hunter.howarrow-up-right

  • onyphe.ioarrow-up-right

  • en.fofa.infoarrow-up-right

  • app.netlas.ioarrow-up-right

  • fullhunt.ioarrow-up-right

  • binaryedge.ioarrow-up-right

hashtag
Sub domain discovery

  • amassarrow-up-right

  • crt.sharrow-up-right

  • Censysarrow-up-right

  • Facebook Developerarrow-up-right

  • sublist3rarrow-up-right

  • subfinderarrow-up-right

  • Theharvesterarrow-up-right

  • assetfinderarrow-up-right

  • virustotalarrow-up-right

  • Phonebookarrow-up-right

PreviousActive Scanningchevron-leftNextVulnerability Scanningchevron-right

Last updated 1 year ago

  • Identify AS Number:
  • Public IP blocks discovery
  • Sub domain discovery