OSINT (short for Open-Source Intelligence Gathering) is a way of knowing your target without any sorts of direct contact or leaving any evidence of the recon.
The OSINT Process
OSINT reconnaissance can be further broken down into the following 5 Phases:
Source Identification: As the starting point, in this initial phase the attacker identifies potential sources from which information may be gathered from. Sources are internally documented throughout the process in detailed notes to come back to later if necessary.
Data Harvesting: In this phase, the attacker collects and harvests information from the selected sources and other sources that are discovered throughout this phase.
Data Processing and Integration: During this phase, the attacker processes the harvested information for actionable intelligence by searching for information that may assist in enumeration.
Data Analysis:In this phase, the attacker performs data analysis of the processed information using OSINT analysis tools.
Results Delivery: In the final phase, OSINT analysis is complete and the findings are presented/reported to other members of the Red Team.
Note: In OSINT you should always ask questions like: how, who, when, where and why. Also try to collect and sort everything you find and make a structured map of the intel you have gathered using a mind mapping tool like XMind or Mind Master.
See if a single server or ip is hosting multiple websites/domains:
Shodan
Search engine for the Internet of everything.
Shodan is the world's first search engine for Internet-connected devices including computers, servers, CCTV cameras, SCADA systems and everything that is connected to the internet with or without attention.
Shodan can be used both as a source for gathering info about random targets for mass attacks and a tool for finding weak spots in a large network of systems to attack and take the low-hanging fruit.
Shodan has a free and commercial membership and is accessible at shodan.io.
The search syntax in the search engine is somehow special and can be found in the help section of the website.
With Shodan you can search for specific systems, ports, services, regions and countries or even specific vulnerable versions of a software or OS service running on systems like SMB v1 and much more.
Here the keywords that are mostly used in Shodan search queries: