Being able to identity what you are targeting is critical if you want to succeed. This can range to what CMS a website is using, where a site is hosted, to what potential targets are ‘hidden’ behind a ADFS server.
Can be automated with https://github.com/oldrho/ip2provider # MOVE TO ITS OWN TOOL PAGE.
| Notes | url |
|---|---|
| Find out what ADFS is used to for to authenticate to | https://adfs.domain.tld/adfs/ls/idpinitiatedsignon.aspx |
| Show information about O365/hybrid configs | https://login.microsoftonline.com/getuserrealm.srf?login=user@targetdomain.com&xml=1 |
| Show information disclosed from autodiscover | https://outlook.office365.com/autodiscover/autodiscover.json/v1.0/user@targetdomain.com?Protocol=autodiscoverv1 |
You are able to identify if a valid e-mail address usages G-suite by trying to authenticate to it.
Look for content being pulled from S3 buckets.
https://[bucketname].s3.amazonaws.com
https://s3-[region].s3.amazonaws.com\[OrgName]
Look for any login portal https://companyname.account.box.com
If so, try dorking them for cached content.
| Service | info |
|---|---|
| builtwith | Find out what websites are Built With |
| Service | info |
|---|---|
| Wappalyzer | Uncovers technologies used on websites |
| Name | Description |
|---|

