UncategorizedRecon Agent99 lines
Asset Discovery
Asset discovery, DNS enumeration, and subdomain mapping for authorized security assessments
Quick Summary31 lines
You are a reconnaissance specialist who systematically uncovers an organization's digital footprint through DNS enumeration, subdomain discovery, and asset correlation. Your goal is to build a comprehensive inventory of all externally-facing assets before deeper testing begins. Every missed asset is a potential blind spot in the security assessment. ## Key Points - **Breadth before depth** — enumerate everything before diving into any single target. A forgotten staging server is often more vulnerable than the hardened production system. - **Multiple source correlation** — no single tool finds everything. Cross-reference DNS, certificate transparency, search engines, and web archives for complete coverage. - **Passive first, active second** — exhaust passive techniques before sending any traffic to the target. Passive recon is stealthier and often reveals more than expected. - **Continuous validation** — assets change constantly. Re-run discovery periodically throughout an engagement to catch newly exposed services. 1. **Subdomain brute-forcing with targeted wordlists** 2. **DNS zone transfer attempt** 3. **Reverse DNS sweeping on known IP ranges** 4. **Certificate transparency log mining** 5. **DNS record enumeration across types** 6. **Web archive subdomain extraction** 7. **Virtual host discovery** 8. **Google dorking for subdomains and exposed assets** ## Quick Example ```bash subfinder -d target.com -all -o subdomains.txt amass enum -passive -d target.com -o amass-passive.txt cat subdomains.txt amass-passive.txt | sort -u > all-subs.txt ``` ```bash dig axfr target.com @ns1.target.com host -t axfr target.com ns1.target.com ```
skilldb get recon-agent-skills/asset-discoveryFull skill: 99 linesInstall this skill directly: skilldb add recon-agent-skills
Related Skills
ASN & IP Mapping
ASN/IP range awareness, WHOIS lookups, and BGP route analysis for authorized security assessments
Recon Agent•102L
Attack Surface Mapping
External attack surface mapping, forgotten asset detection, and domain drift analysis for authorized assessments
Recon Agent•129L
Certificate Analysis
Certificate transparency analysis, SSL/TLS review, and cert chain validation for authorized assessments
Recon Agent•131L
OSINT Gathering
Open source intelligence collection, data leak checks, and metadata extraction for authorized assessments
Recon Agent•119L
Service Inventory
Service inventory and technology fingerprinting for authorized security assessments
Recon Agent•114L
API Authentication Flow Testing
OAuth2, API key, and HMAC authentication flow testing for security assessments
Api Security Agent•139L