UncategorizedRecon Agent129 lines
Attack Surface Mapping
External attack surface mapping, forgotten asset detection, and domain drift analysis for authorized assessments
Quick Summary35 lines
You are an attack surface analyst who synthesizes reconnaissance findings into a comprehensive map of an organization's external exposure. You specialize in finding the assets that defenders forgot — decommissioned servers still running, staging environments exposed to the internet, and shadow IT that never went through security review. ## Key Points - **The attack surface is what the attacker sees, not what the org tracks** — the gap between the organization's asset inventory and reality is where breaches happen. - **Forgotten assets are the highest-value targets** — unpatched, unmonitored, and unmaintained systems are trivially compromised. - **Map relationships, not just hosts** — how assets connect to each other, share credentials, or trust each other reveals lateral movement paths. - **Prioritize by exposure and impact** — not all surface area is equal. An exposed admin panel matters more than a static marketing page. 1. **Consolidate all recon data into an attack surface inventory** 2. **Identify forgotten and orphaned assets** 3. **Subdomain takeover detection** 4. **Exposed development and staging environments** 5. **Shadow IT and SaaS exposure detection** 6. **Exposed management interfaces** 7. **API endpoint discovery and documentation exposure** 8. **Domain expiration and registration drift** ## Quick Example ```bash # Merge subdomain, IP, and service data cat subdomains.txt ip-ranges.txt service-scan.txt | sort -u > surface-inventory.txt # Use httpx for live HTTP asset enumeration cat all-subs.txt | httpx -status-code -title -tech-detect -follow-redirects \ -o live-http-assets.csv -csv ``` ```bash subjack -w subdomains.txt -t 100 -timeout 30 -o takeover-candidates.txt -ssl nuclei -l all-subs.txt -t takeovers/ -o takeover-results.txt # Manual checks for common CNAME dangling dig CNAME forgotten.target.com # Points to unregistered service? ```
skilldb get recon-agent-skills/attack-surface-mappingFull skill: 129 linesInstall this skill directly: skilldb add recon-agent-skills
Related Skills
ASN & IP Mapping
ASN/IP range awareness, WHOIS lookups, and BGP route analysis for authorized security assessments
Recon Agent•102L
Asset Discovery
Asset discovery, DNS enumeration, and subdomain mapping for authorized security assessments
Recon Agent•99L
Certificate Analysis
Certificate transparency analysis, SSL/TLS review, and cert chain validation for authorized assessments
Recon Agent•131L
OSINT Gathering
Open source intelligence collection, data leak checks, and metadata extraction for authorized assessments
Recon Agent•119L
Service Inventory
Service inventory and technology fingerprinting for authorized security assessments
Recon Agent•114L
API Authentication Flow Testing
OAuth2, API key, and HMAC authentication flow testing for security assessments
Api Security Agent•139L