conducting-external-reconnaissance-with-osint
Conducts external reconnaissance using Open Source Intelligence (OSINT) techniques to map an organization's external attack surface without directly interacting with target systems. The tester gathers information from public sources including DNS records, certificate transparency logs, search engines, social media, code repositories, and data breach databases to build a comprehensive target profile. Activates for requests involving OSINT reconnaissance, external footprinting, attack surface mapping, or passive information gathering.
Best use case
conducting-external-reconnaissance-with-osint is best used when you need a repeatable AI agent workflow instead of a one-off prompt.
Conducts external reconnaissance using Open Source Intelligence (OSINT) techniques to map an organization's external attack surface without directly interacting with target systems. The tester gathers information from public sources including DNS records, certificate transparency logs, search engines, social media, code repositories, and data breach databases to build a comprehensive target profile. Activates for requests involving OSINT reconnaissance, external footprinting, attack surface mapping, or passive information gathering.
Teams using conducting-external-reconnaissance-with-osint should expect a more consistent output, faster repeated execution, less prompt rewriting.
When to use this skill
- You want a reusable workflow that can be run more than once with consistent structure.
When not to use this skill
- You only need a quick one-off answer and do not need a reusable workflow.
- You cannot install or maintain the underlying files, dependencies, or repository context.
Installation
Claude Code / Cursor / Codex
Manual Installation
- Download SKILL.md from GitHub
- Place it in
.claude/skills/conducting-external-reconnaissance-with-osint/SKILL.mdinside your project - Restart your AI agent — it will auto-discover the skill
How conducting-external-reconnaissance-with-osint Compares
| Feature / Agent | conducting-external-reconnaissance-with-osint | Standard Approach |
|---|---|---|
| Platform Support | Not specified | Limited / Varies |
| Context Awareness | High | Baseline |
| Installation Complexity | Unknown | N/A |
Frequently Asked Questions
What does this skill do?
Conducts external reconnaissance using Open Source Intelligence (OSINT) techniques to map an organization's external attack surface without directly interacting with target systems. The tester gathers information from public sources including DNS records, certificate transparency logs, search engines, social media, code repositories, and data breach databases to build a comprehensive target profile. Activates for requests involving OSINT reconnaissance, external footprinting, attack surface mapping, or passive information gathering.
Where can I find the source code?
You can find the source code on GitHub using the link provided at the top of the page.
Related Guides
AI Agents for Coding
Browse AI agent skills for coding, debugging, testing, refactoring, code review, and developer workflows across Claude, Cursor, and Codex.
Best AI Skills for Claude
Explore the best AI skills for Claude and Claude Code across coding, research, workflow automation, documentation, and agent operations.
ChatGPT vs Claude for Agent Skills
Compare ChatGPT and Claude for AI agent skills across coding, writing, research, and reusable workflow execution.
SKILL.md Source
# Conducting External Reconnaissance with OSINT ## When to Use - Performing the initial reconnaissance phase of a penetration test to gather intelligence before active scanning - Mapping an organization's external attack surface to identify unknown or shadow IT assets - Collecting employee information, email formats, and organizational structure for social engineering campaigns - Identifying exposed credentials, leaked data, or sensitive documents published on the internet - Scoping the breadth of an organization's digital footprint prior to a red team engagement **Do not use** for stalking, harassment, or unauthorized surveillance of individuals. OSINT gathering must be conducted within the scope of an authorized engagement and comply with applicable privacy laws (GDPR, CCPA). ## Prerequisites - Written authorization to perform reconnaissance against the target organization - Dedicated research workstation with a VPN or Tor for anonymized queries when required - OSINT framework tools installed: Amass, theHarvester, Shodan CLI, Recon-ng, SpiderFoot - API keys for Shodan, Censys, SecurityTrails, Hunter.io, VirusTotal, and GitHub for enhanced results - Disposable email accounts for accessing services that require registration during research ## Workflow ### Step 1: Domain and DNS Enumeration Enumerate all domains, subdomains, and DNS records associated with the target: - **Root domain identification**: Start with the primary domain and identify all related domains through reverse WHOIS lookups on registrant name, email, and organization using `whoxy.com` or `domaintools.com` - **Subdomain enumeration**: Run multiple tools for comprehensive coverage: - `amass enum -passive -d target.com -o amass_subs.txt` for passive subdomain discovery from 40+ data sources - `subfinder -d target.com -all -o subfinder_subs.txt` for fast passive enumeration - `crt.sh` certificate transparency log queries: `curl -s "https://crt.sh/?q=%25.target.com&output=json" | jq -r '.[].name_value' | sort -u` - **DNS record analysis**: Query for all record types: `dig target.com ANY`, check for SPF, DKIM, DMARC records that reveal email infrastructure, and enumerate MX records to identify email providers - **Zone transfer attempt**: `dig axfr @ns1.target.com target.com` to check for misconfigured DNS servers - **Consolidate results**: Merge, deduplicate, and resolve all discovered subdomains to IP addresses. Map IP addresses to ASN and hosting providers. ### Step 2: Infrastructure and Service Discovery Identify internet-facing infrastructure without directly scanning target systems: - **Shodan**: `shodan search "ssl.cert.subject.cn:target.com"` to find all internet-facing services with TLS certificates for the target domain. Also search by organization name and IP ranges. - **Censys**: Search for target's IP ranges and TLS certificates to identify services, technologies, and potential vulnerabilities indexed from internet-wide scanning - **Cloud asset discovery**: Check for S3 buckets (`target-com`, `target-backup`, `target-dev`), Azure Blob storage (`target.blob.core.windows.net`), and GCP storage using tools like `cloud_enum` - **WAF and CDN identification**: Use `wafw00f target.com` to identify web application firewalls and CDN providers that may mask the origin server IP - **Historical data**: Use Wayback Machine (`web.archive.org`) to find removed pages, old application versions, and forgotten endpoints ### Step 3: Email and Personnel Intelligence Gather employee information and email addresses for social engineering preparation: - **Email harvesting**: `theHarvester -d target.com -b all -f harvest_results.html` to collect emails from search engines, LinkedIn, and data sources - **Email format identification**: Use `hunter.io` to determine the email format (first.last, flast, firstl) and verify deliverability - **LinkedIn reconnaissance**: Identify employees by department, particularly IT administrators, security team members, and executives. Note technologies mentioned in job postings and employee profiles. - **Organizational chart**: Build an org chart from LinkedIn data to understand reporting structures, identify key personnel, and map departments - **Social media analysis**: Review employee social media profiles for information about internal tools, technologies, office locations, badge photos, and security practices - **Job postings**: Analyze current and historical job postings on the company career page and job boards for technology stack details, tools, and infrastructure information ### Step 4: Credential and Data Leak Analysis Search for exposed credentials and sensitive data: - **Breach databases**: Check `haveibeenpwned.com` API for breached email addresses associated with the target domain - **Paste sites**: Search Pastebin, GitHub Gists, and similar paste sites for leaked credentials, configuration files, or internal documents - **Code repositories**: Search GitHub, GitLab, and Bitbucket for: - `org:target "password"`, `org:target "api_key"`, `org:target "secret"` - Use `trufflehog` or `gitleaks` for automated secret scanning across the target's public repositories - **Document metadata**: Download publicly available documents (PDF, DOCX, XLSX) from the target website and extract metadata using `exiftool` to reveal internal usernames, software versions, printer names, and file paths - **Google dorking**: Use targeted search operators: - `site:target.com filetype:pdf` for public documents - `site:target.com inurl:admin` for admin panels - `site:target.com "index of /"` for directory listings - `site:pastebin.com "target.com"` for paste site mentions ### Step 5: Technology Stack Profiling Identify the technologies, frameworks, and services used by the target: - **Web technology fingerprinting**: Use `whatweb target.com` or Wappalyzer browser extension to identify CMS, frameworks, JavaScript libraries, analytics, and server software - **SSL/TLS analysis**: `sslyze target.com` or `testssl.sh target.com` to identify cipher suites, protocol versions, certificate details, and cryptographic weaknesses - **JavaScript analysis**: Download and review JavaScript files for framework identifiers, API endpoints, internal hostnames, and version strings - **DNS-based service identification**: Review TXT records for service providers (e.g., `v=spf1 include:_spf.google.com` indicates Google Workspace, `MS=msXXXXXX` indicates Microsoft 365) - **Mobile app analysis**: Download the target's mobile applications from app stores and analyze with `apktool` (Android) or `frida` for hardcoded URLs, API endpoints, and embedded credentials ## Key Concepts | Term | Definition | |------|------------| | **OSINT** | Open Source Intelligence; intelligence collected from publicly available sources including websites, social media, public records, and government data | | **Passive Reconnaissance** | Information gathering without directly interacting with target systems, leaving no footprint in target logs | | **Active Reconnaissance** | Information gathering that involves direct interaction with target systems (scanning, probing) and may be logged | | **Certificate Transparency** | Public logs of TLS certificates issued by certificate authorities, queryable to discover subdomains and infrastructure | | **Attack Surface** | The sum of all points where an unauthorized user can attempt to enter or extract data from an environment | | **Google Dorking** | Using advanced Google search operators to find sensitive information indexed by search engines that was not intended to be public | | **Shadow IT** | Technology systems and services deployed by employees or departments without the knowledge or approval of the IT department | ## Tools & Systems - **Amass (OWASP)**: Comprehensive subdomain enumeration tool that combines passive sources, DNS brute-forcing, and certificate transparency log analysis - **Shodan**: Internet-wide scanning database that indexes services, banners, and metadata for internet-connected devices, searchable by IP, domain, or organization - **theHarvester**: OSINT tool for gathering emails, subdomains, hosts, employee names, and open ports from public sources - **SpiderFoot**: Automated OSINT collection platform that queries 200+ data sources and correlates findings into a unified graph - **Recon-ng**: Modular web reconnaissance framework with a database backend for organizing and cross-referencing discovered intelligence ## Common Scenarios ### Scenario: Pre-Engagement Reconnaissance for a Red Team Exercise **Context**: A technology company has contracted a red team assessment. Before active testing begins, the team conducts passive OSINT to map the attack surface and identify potential entry points. The target is a SaaS company with 500 employees and a primary domain of techcorp.io. **Approach**: 1. Enumerate 147 subdomains via Amass and crt.sh, including staging.techcorp.io, jenkins.techcorp.io, and vpn.techcorp.io 2. Shodan reveals a forgotten Elasticsearch instance on port 9200 with no authentication exposed to the internet 3. theHarvester collects 89 employee email addresses, revealing the format first.last@techcorp.io 4. GitHub search discovers a former developer's public repository containing a `.env` file with AWS access keys 5. LinkedIn analysis reveals the company uses Okta for SSO, Jira for project management, and AWS for hosting 6. Google dorking finds a directory listing on docs.techcorp.io exposing internal architecture diagrams 7. Compile all intelligence into a reconnaissance report that feeds directly into the threat modeling and attack planning phases **Pitfalls**: - Relying on a single subdomain enumeration tool and missing assets found by other tools using different data sources - Failing to check cloud storage services (S3, Azure Blob, GCP) for publicly accessible buckets - Not searching for credentials in public code repositories, which frequently yield immediate access - Conducting active scanning (port scans, vulnerability scans) during what should be a passive-only phase ## Output Format ``` ## External Reconnaissance Report - TechCorp.io ### Attack Surface Summary - **Domains discovered**: 3 (techcorp.io, techcorp.com, techcorpapp.com) - **Subdomains enumerated**: 147 unique subdomains across all domains - **Unique IP addresses**: 34 IPs mapped across AWS us-east-1 and us-west-2 - **Email addresses collected**: 89 valid corporate email addresses - **Exposed services**: 12 internet-facing services identified via Shodan/Censys ### Critical Findings **1. Unauthenticated Elasticsearch Instance** - Host: 52.xx.xx.xx:9200 (elastic.techcorp.io) - Indexed data: Application logs containing user session tokens and PII - Source: Shodan search "ssl.cert.subject.cn:techcorp.io" **2. AWS Credentials in Public GitHub Repository** - Repository: github.com/former-dev/techcorp-scripts - File: .env containing AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY - Status: Keys appear active (not tested - out of scope for passive recon) **3. Directory Listing Exposing Internal Documents** - URL: https://docs.techcorp.io/internal/ - Contents: Architecture diagrams, network topology, runbooks - Source: Google dork "site:techcorp.io intitle:index.of" ### Recommendations 1. Immediately rotate the exposed AWS credentials and audit CloudTrail logs 2. Restrict Elasticsearch access to internal networks or add authentication 3. Disable directory listings on docs.techcorp.io and audit all web servers 4. Implement GitHub secret scanning across all organization repositories ```
Related Skills
performing-osint-with-spiderfoot
Automate OSINT collection using SpiderFoot REST API and CLI for target profiling, module-based reconnaissance, and structured result analysis across 200+ data sources
performing-external-network-penetration-test
Conduct a comprehensive external network penetration test to identify vulnerabilities in internet-facing infrastructure using PTES methodology, reconnaissance, scanning, exploitation, and reporting.
performing-ai-driven-osint-correlation
Use AI and LLM-based reasoning to correlate findings across multiple OSINT sources—username enumeration, email lookups, social media profiles, domain records, breach databases, and dark-web mentions—into unified intelligence profiles with confidence scoring and link analysis.
conducting-wireless-network-penetration-test
Conducts authorized wireless network penetration tests to assess the security of WiFi infrastructure by testing for weak encryption protocols, captive portal bypasses, evil twin attacks, WPA2/WPA3 handshake capture, rogue access point detection, and client-side attacks. The tester evaluates wireless authentication, network segmentation, and the effectiveness of wireless intrusion detection systems. Activates for requests involving wireless pentest, WiFi security assessment, WPA2/WPA3 testing, or rogue access point detection.
conducting-spearphishing-simulation-campaign
Spearphishing simulation is a targeted social engineering attack vector used by red teams to gain initial access. Unlike broad phishing campaigns, spearphishing uses OSINT-derived intelligence to craf
conducting-social-engineering-pretext-call
Plan and execute authorized vishing (voice phishing) pretext calls to assess employee susceptibility to social engineering and evaluate security awareness controls.
conducting-social-engineering-penetration-test
Design and execute a social engineering penetration test including phishing, vishing, smishing, and physical pretexting campaigns to measure human security resilience and identify training gaps.
conducting-post-incident-lessons-learned
Facilitate structured post-incident reviews to identify root causes, document what worked and failed, and produce actionable recommendations to improve future incident response.
conducting-phishing-incident-response
Responds to phishing incidents by analyzing reported emails, extracting indicators, assessing credential compromise, quarantining malicious messages across the organization, and remediating affected accounts. Covers email header analysis, URL/attachment sandboxing, and mailbox-wide purge operations. Activates for requests involving phishing response, email incident, credential phishing, spear phishing investigation, or phishing remediation.
conducting-pass-the-ticket-attack
Pass-the-Ticket (PtT) is a lateral movement technique that uses stolen Kerberos tickets (TGT or TGS) to authenticate to services without knowing the user's password. By extracting Kerberos tickets fro
conducting-network-penetration-test
Conducts comprehensive network penetration tests against authorized target environments by performing host discovery, port scanning, service enumeration, vulnerability identification, and controlled exploitation to assess the security posture of network infrastructure. The tester follows PTES methodology from reconnaissance through post-exploitation and reporting. Activates for requests involving network pentest, infrastructure security assessment, internal network testing, or external perimeter testing.
conducting-mobile-app-penetration-test
Conducts penetration testing of iOS and Android mobile applications following the OWASP Mobile Application Security Testing Guide (MASTG) to identify vulnerabilities in data storage, network communication, authentication, cryptography, and platform-specific security controls. The tester performs static analysis of application binaries, dynamic analysis at runtime, and API security testing to evaluate the complete mobile attack surface. Activates for requests involving mobile app pentest, iOS security assessment, Android security testing, or OWASP MASTG assessment.