🔹 Goal: Identify attack surfaces and gather intelligence about the target.
🔹 Tools: Amass, Subfinder, Assetfinder, nmap, Shodan, theHarvester, waybackurls, Burp Suite, Google Dorks
✅ Subdomain Enumeration
amass enum -passive -d target.comsubfinder -d target.comdig @8.8.8.8 target.com +short✅ Port Scanning
nmap -sC -sV -p- target.com✅ Technology Fingerprinting
whatweb target.comwappalyzer extension (Burp/Browser)✅ Wayback Enumeration
waybackurls target.com | tee wayback.txt✅ Google Dorking
site:target.com filetype:env OR filetype:sql OR filetype:log