Workflows / Network Reconnaissance

Network Reconnaissance

Map the complete network attack surface through DNS enumeration, geolocation, service probing, and attack vector analysis.

Effective security testing begins with thorough reconnaissance. Understanding the full scope of a target network, from DNS records through hosting infrastructure to running services, determines the quality and coverage of subsequent security testing. Incomplete reconnaissance leads to blind spots that attackers will find.

This workflow performs systematic network reconnaissance starting with DNS enumeration, mapping the network topology through geolocation and ASN analysis, enumerating services across all discovered hosts, and identifying the most promising attack vectors. The result is a complete attack surface map that guides focused, efficient security testing.

Steps

1

DNS Reconnaissance

DNS Domain icon
DNS Domain

Perform comprehensive DNS enumeration to discover all associated hosts, mail servers, and service records.

Input: Target domain for DNS reconnaissance.
Output: All DNS records revealing the target network topology and service architecture.
2

Map Network Topology

IP Geolocation icon
IP Geolocation

Geolocate and identify all hosting providers, ASNs, and network ranges associated with discovered IPs.

Input: IP addresses discovered through DNS enumeration.
Output: Network topology map with ISPs, ASNs, geographic distribution, and hosting providers.
3

Service Enumeration

Security HTTPx icon
Security HTTPx

Probe all discovered hosts to enumerate running services, web technologies, and open ports.

Input: List of IPs and hostnames to probe.
Output: Running services, technology stacks, HTTP responses, and server banners per host.
4

Identify Attack Vectors

Pentest icon
Pentest

Analyze the discovered infrastructure to identify potential attack vectors and entry points for further testing.

Input: Consolidated reconnaissance data from previous steps.
Output: Prioritized list of potential attack vectors, weak points, and recommended testing areas.

Benefits

  • Map the complete network attack surface before testing begins
  • Identify all hosting providers and network ranges in scope
  • Discover services and technologies that inform testing strategies
  • Prioritize attack vectors based on discovered infrastructure

Related Use Cases

Open Probe Security Headers

Probe Security Headers

Check HTTP security headers across your web properties to identify missing protections like CSP, HSTS, and X-Frame-Options.

Security HTTPx icon
Security HTTPx
4 agent guides
Open Discover Hidden Services

Discover Hidden Services

Find hidden or forgotten web services running on your infrastructure that may be exposed without your knowledge.

Security HTTPx icon
Security HTTPx
4 agent guides
Open Look Up DNS Records

Look Up DNS Records

Query DNS records for any domain to inspect A, AAAA, MX, CNAME, TXT, and NS configurations.

DNS Domain icon
DNS Domain
4 agent guides
Open Geolocate Website Visitors

Geolocate Website Visitors

Determine the geographic location of website visitors from their IP addresses for analytics and personalization.

IP Geolocation icon
IP Geolocation
4 agent guides
Open Detect Suspicious Login Locations

Detect Suspicious Login Locations

Flag logins from unexpected geographic locations by comparing IP geolocation against known user patterns.

IP Geolocation icon
IP Geolocation
4 agent guides
Open Test API Security

Test API Security

Assess the security of REST APIs by testing authentication, authorization, input validation, and injection resistance.

Pentest icon
Pentest
4 agent guides