Information-Gathering — concise notes
Below is a cleaned-up, organized version of your notes with short explanations and examples.
Use responsibly (authorized testing only).
1. Basic Linux / host info
1. ifconfig / ip addr / ip a — show network interfaces and IP addresses on your
machine.
Example: ip a show eth0
2. hostname / hostname -I — show host name / IP(s) of the host.
3. ping <host> — check connectivity / round-trip time to a host.
Example: ping -c 4 [Link]
4. traceroute <host> (Linux) / tracert <host> (Windows) — show route packets take
to reach the host.
Example: traceroute [Link]
5. arp -a — show ARP table (IP ⇄ MAC mappings) on local network.
6. netstat -tulpn or ss -tulpn — show listening ports and associated processes.
2. Process / system management
1. ps — display current shell processes.
2. ps aux — full snapshot of all processes from all users.
3. top — interactive real-time process viewer.
4. htop — improved, easier-to-read top (needs install).
5. kill <PID> — send SIGTERM to a process to stop it.
o kill -9 <PID> sends SIGKILL (force kill). Use carefully.
6. systemctl status <service> — check systemd service status.
3. DNS & domain reconnaissance
1. dig [Link] — DNS lookup, shows A, NS, MX, etc. (more flexible than
nslookup).
Example: dig +short [Link] A
2. nslookup [Link] — basic DNS query tool (older).
3. whois [Link] — registration details for a domain (registrar, dates, contact).
4. host [Link] — simple DNS lookup.
5. dig @[Link] [Link] ANY — query a specific DNS server.
4. Email / user enumeration
1. python [Link] — your own script to extract emails (example).
2. [Link] — check if an email appears in breaches (online service).
5. Subdomain / attack surface discovery
1. amass, subfinder, sublist3r — enumerate subdomains from different sources.
2. [Link] — search certificate transparency logs for domains/subdomains.
3. securitytrails, Shodan, Censys — find hosts, services, exposed assets.
6. Google dorks (search engine reconnaissance)
• intitle:"Harry Potter" filetype:pdf — find PDFs with "Harry Potter" in title.
• site:[Link] inurl:[Link]?id — find [Link] pages on .[Link] sites.
• intitle:"Ahmed Qadir" inurl:[Link] — LinkedIn pages mentioning name.
• inurl:view/[Link] — find pages with that path.
Tip: combine operators (site:, inurl:, intitle:, filetype:, ext:) to narrow results.
Tools / DB: Google Hacking Database (GHDB) — many useful dork examples (found via
Exploit-DB → GHDB).
7. Common online services & tools (quick list)
• [Link] — geoIP lookup.
• [Link] — link-based IP logger (be careful, privacy implications).
• [Link] — cloud / VPS provider (example of cloud server provider).
• [Link] — breached account checker.
• [Link] — disposable temporary email.
• [Link]/email — DuckDuckGo email protection (masked email).
• [Link] — privacy-focused email provider.
• [Link] — site reports and hosting info.
• [Link] — domain/host history, DNS records.
• [Link] — Wayback Machine for historical site snapshots.
• exploit-db (GHDB) — Google Dork database and exploits.
• [Link] — internet-connected device search engine.
• [Link] / [Link] — niche data/privacy resources (verify before use).
8. Useful automated recon frameworks
• Recon-ng — modular web reconnaissance framework.
• Metasploit — exploitation framework (also contains recon modules).
• SpiderFoot — automated OSINT and attack surface discovery.
• Maltego — visual link analysis (commercial / community editions).
9. Logging & archives
• [Link] (Wayback Machine) — review old versions of websites.
• Common Crawl / public datasets — large public web crawls for research.
10. Short examples (one-liners)
• List open ports + services: nmap -sV -p- [Link]
• Quick DNS A record: dig +short [Link]
• Check headers: curl -I [Link]
• Find PDFs with dork: site:[Link] filetype:pdf "confidential"