Monday, February 23, 2026

Passive Reconnaissance Mastery Program

Tech Guardians – Cyber Range Based Course

Passive reconnaissance is the foundation of professional cybersecurity assessments. Before scanning, exploiting, or defending systems, security professionals must first understand a target’s external digital footprint.

Network Security Phase–1 by Tech Guardians is designed to build that foundation using structured, lab-based training inside a controlled cyber range.

This blog explains the step-by-step methodology, tools, and practical approach used in the course.


Why Passive Reconnaissance Matters

Passive reconnaissance allows analysts to gather intelligence without directly interacting with the target infrastructure.

This means:

  • No intrusion detection alerts

  • No logs triggered on the target

  • No direct packets sent to the organization

  • Completely OSINT-based intelligence gathering (within legal scope)

This stage identifies:

  • Domain ownership

  • Hosting infrastructure

  • Email servers

  • DNS misconfigurations

  • Exposed internet services

  • Subdomains and hidden assets


Tools Covered in Phase–1

ToolPurpose
    whois                    Domain registration intelligence
    nslookup            DNS record enumeration
    dig            Advanced DNS analysis
    DNSDumpster            Subdomain & infrastructure mapping
    Shodan.io            Internet-wide exposure intelligence

Step 1 – WHOIS Intelligence Gathering

WHOIS provides registration-level information about a domain.

Tool Used: whois

Command:

whois example.com

What It Reveals:

  • Registrar

  • Creation date

  • Expiration date

  • Name servers

  • Registrant details (if not privacy protected)

Practical Use Case:

  • Identify domain takeover risks

  • Detect expired domain vulnerabilities

  • Assess social engineering opportunities

  • Identify DNS infrastructure


Step 2 – DNS Enumeration with nslookup

DNS records expose infrastructure details.

Tool Used: nslookup


A Record (IPv4 Lookup)

nslookup -type=A example.com 1.1.1.1

Output Analysis:

  • Extract IP addresses

  • Identify hosting provider

  • Map infrastructure


MX Record (Mail Server Discovery)

nslookup -type=MX example.com

Analysis:

  • Identify mail provider (Google, Microsoft, Self-hosted)

  • Analyze email routing

  • Assess email attack surface


TXT Record (Email Security)

nslookup -type=TXT example.com

Look For:

  • SPF record

  • DKIM

  • DMARC

These protect against email spoofing and phishing attacks.


Step 3 – Advanced DNS Analysis Using dig

dig provides more technical details compared to nslookup.

Tool Used: dig


Basic A Record Query

dig example.com A

Students Analyze:

  • TTL (Time To Live)

  • Authoritative server

  • Response flags


Query Specific DNS Server

dig @1.1.1.1 example.com MX

This helps verify DNS propagation and compare results across DNS providers.


Step 4 – Subdomain Discovery

Standard DNS tools cannot automatically discover hidden subdomains.


Method 1 – Manual Google Dorking

Search:

site:example.com

This reveals indexed subdomains.


Method 2 – DNSDumpster

Image

Image


Image

What DNSDumpster Provides:

  • Subdomains

  • DNS servers

  • MX servers

  • IP addresses

  • Infrastructure graph mapping

This visual representation helps identify attack surface quickly.


Step 5 – Exposure Intelligence Using Shodan

Shodan scans the internet and indexes exposed services.

Image

Image

Image

Image

What Shodan Reveals:

  • Open ports

  • Server banners

  • Service versions

  • Hosting company

  • Geographic location

Workflow:

  1. Extract IP from A record

  2. Search IP in Shodan

  3. Identify open ports

  4. Identify exposed services

  5. Assess risk


Final Challenge – Passive Recon Report

Students perform a complete reconnaissance cycle:

  1. WHOIS analysis

  2. DNS A, MX, TXT enumeration

  3. Subdomain discovery

  4. Infrastructure mapping

  5. Shodan exposure analysis

  6. Professional reconnaissance report creation

No comments:

Post a Comment