Note: The audio version doesn't include code or commands. Those parts of the post can be seen in the text version.
Are you aware of your infrastructure's weakest spots? Attackers surely are. Target reconnaissance is one of their first steps toward getting full insight into an objective, one that will eventually develop into a complete attack strategy to compromise assets.
Any information that an organization leaks (however benign it may appear) is feasible for malversation and misuse for deceptive purposes.
Today we're testing **Attack Surface Mapper**, a recon tool designed to help you boost the effectiveness of your Osint daily tasks and bring extra help to the existing intel tools already used in daily infosec jobs.
Let's now discover what Attack Surface Mapper is, by exploring the installation, configuration, and testing process. And we'll find out whether it's a good choice for your infosec reconnaissance needs.
What is Attack Surface Mapper?
Attack Surface Mapper, as its name implies, is a free, multi-platform (for Linux, macOS, and Windows) tool used to create a full map of your attack surface.
According to its authors Andreas Georgiou and Jacob Wilkin, this recon tool uses both classic Osint and other types of active techniques to gather all possible intel on any target.
To create the full subdomain map, it launches several brute force mapping attacks as well as passive DNS lookups and searches for data on the same subnet IP addresses to find subdomains.
Once all subdomain, domain, and IP intelligence are found, it can take screenshots of the website, search for email addresses of employees on Linkedin, perform passive port scans, and generate visual maps of your target.
Installation
Installing Attack Surface Mapper is pretty straightforward, requiring only three simple commands to get it working. Let's cover the process step by step:
Download AttackSurfaceMapper from their Github repo:
A few dependencies may be needed. Follow the next steps to solve those dependencies using pip:
The next step is configuring your AP-I key. This is only if you want to integrate any of the following services into your scan: VirusTotal, Shodan, Hunter, LinkedIn, Gray Hat Warfare.
Open the keylist.asm file:
Then configure all keys as needed:
Do the same, and tweak the AP-I configuration file as you desire to match your own keys.
How does it work?
Running Attack Surface Mapper is easy. Just use:
Replace "securitytrails.com" with your real target, and set a desired file name to save the results (in our case "results"), and that's it. In our tests, we set the target to be 'shodan.io', as you can see in the following screenshot:
In the video below, you can see a demo by one of the authors in which he demonstrates how Attack Surface Mapper works:
Analyzing the results
We ran numerous tests against several targets, and here's what we discovered.
Once the app finishes its attack surface mapping, it will display the results on the same screen, shown here:
These results found a lot of subdomains, 185 to be exact. Apart from that, we also found DNS records, including MX and D-Marc information, as well as the SPF data. When it comes to IP addresses, after performing the IP lookups it found two addresses and included geolocation, ASN, and CIDR.
Scrolling down a bit, we found the summary of findings related to the shodan.io domain name:
3 IPs, 185 subdomains, 24 open ports, and more. However, let's remember that this was the default command suggested by the documentation. By exploring the official docs a bit and playing with the '--help' option we found other options that may be used:
Now you see that we can add more intelligence data to our ASM execution, by adding options like:
-sc: to grab a screenshot of the target website.
-ln: to extract a list of emails and employees from Linkedin.
-sth: to use passive mode using only Osint traditional techniques.
-w: to load subdomain names from...