<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Amrit Sinha</title>
    <description>The latest articles on DEV Community by Amrit Sinha (@sinhaamrit).</description>
    <link>https://dev.to/sinhaamrit</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3065344%2Ff223260f-6e4a-49d5-ad93-585d3099d56a.jpg</url>
      <title>DEV Community: Amrit Sinha</title>
      <link>https://dev.to/sinhaamrit</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/sinhaamrit"/>
    <language>en</language>
    <item>
      <title>Passive Recon — How I Map Targets Without Ever Touching Them</title>
      <dc:creator>Amrit Sinha</dc:creator>
      <pubDate>Thu, 12 Mar 2026 16:17:50 +0000</pubDate>
      <link>https://dev.to/sinhaamrit/passive-recon-how-i-map-targets-without-ever-touching-them-4od6</link>
      <guid>https://dev.to/sinhaamrit/passive-recon-how-i-map-targets-without-ever-touching-them-4od6</guid>
      <description>&lt;p&gt;Before I fire a single Nmap scan, before I touch a login form, before I do &lt;em&gt;anything&lt;/em&gt; active — I spend serious time in passive recon.&lt;/p&gt;

&lt;p&gt;No packets sent to their servers. No WAF alerts. No IDS logs lighting up. Just me pulling together everything the target accidentally handed to the public internet without realizing it.&lt;/p&gt;

&lt;p&gt;That's passive reconnaissance — and if you're skipping it to jump straight to scanning, you're flying blind.&lt;/p&gt;




&lt;h2&gt;
  
  
  What Is Passive Reconnaissance?
&lt;/h2&gt;

&lt;p&gt;Passive recon means collecting intelligence about a target &lt;strong&gt;using only publicly available sources&lt;/strong&gt;. You never interact with their infrastructure directly. Everything you gather already exists somewhere on the open web:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;WHOIS and DNS records&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;robots.txt&lt;/code&gt; and sitemaps&lt;/li&gt;
&lt;li&gt;Search engine caches&lt;/li&gt;
&lt;li&gt;Social media and public directories&lt;/li&gt;
&lt;li&gt;Data breach databases&lt;/li&gt;
&lt;li&gt;GitHub commits and public repos&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;For bug bounty hunters, this phase is everything. It shapes &lt;em&gt;where&lt;/em&gt; you look, &lt;em&gt;what&lt;/em&gt; tech you're fighting, and &lt;em&gt;which&lt;/em&gt; parts of the attack surface are actually worth your time.&lt;/p&gt;




&lt;h2&gt;
  
  
  My Go-To Passive Recon Toolkit
&lt;/h2&gt;

&lt;h3&gt;
  
  
  1. &lt;code&gt;robots.txt&lt;/code&gt; — The Accidental Treasure Map
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;curl &lt;span class="nt"&gt;-s&lt;/span&gt; https://target.com/robots.txt
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This file tells crawlers what &lt;em&gt;not&lt;/em&gt; to index. The irony? Developers sometimes drop juicy paths like &lt;code&gt;/admin&lt;/code&gt;, &lt;code&gt;/internal&lt;/code&gt;, or &lt;code&gt;/staging&lt;/code&gt; in there — thinking "hidden" equals "secure."&lt;/p&gt;

&lt;p&gt;It won't hand you a vulnerability, but it's a reliable lead for deeper analysis.&lt;/p&gt;




&lt;h3&gt;
  
  
  2. &lt;code&gt;sitemap.xml&lt;/code&gt; — The Full Website Index
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;curl &lt;span class="nt"&gt;-s&lt;/span&gt; https://target.com/sitemap.xml
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Sitemaps help search engines find pages. They also accidentally expose &lt;code&gt;/beta&lt;/code&gt;, &lt;code&gt;/legacy&lt;/code&gt;, or forgotten endpoints the dev team never cleaned up from production.&lt;/p&gt;




&lt;h3&gt;
  
  
  3. &lt;code&gt;host&lt;/code&gt; — Quick DNS Lookups
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;host target.com
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Fast IP resolution. Also reveals whether a CDN like Cloudflare sits in front — which matters a lot for planning your next steps.&lt;/p&gt;




&lt;h3&gt;
  
  
  4. WHOIS — Classic, Still Powerful
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;whois target.com
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Registrar info, nameservers, registration dates, org contacts. Great for confirming scope and mapping related domains.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Online alternatives:&lt;/strong&gt; &lt;a href="https://who.is" rel="noopener noreferrer"&gt;who.is&lt;/a&gt; | &lt;a href="https://www.whois.com" rel="noopener noreferrer"&gt;whois.com&lt;/a&gt;&lt;/p&gt;




&lt;h3&gt;
  
  
  5. DNSDumpster — Visual DNS Footprint Mapping
&lt;/h3&gt;

&lt;p&gt;No installation needed. &lt;a href="https://dnsdumpster.com" rel="noopener noreferrer"&gt;dnsdumpster.com&lt;/a&gt; gives you a visual map of an org's subdomains, MX, TXT, and NS records in seconds.&lt;/p&gt;

&lt;p&gt;Underrated tool for getting a bird's-eye view before going deeper.&lt;/p&gt;




&lt;h3&gt;
  
  
  6. Tech Fingerprinting — Know the Stack Before You Attack
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;whatweb https://target.com
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Or use browser extensions like &lt;strong&gt;Wappalyzer&lt;/strong&gt; or &lt;strong&gt;BuiltWith&lt;/strong&gt; for zero-effort fingerprinting.&lt;/p&gt;

&lt;p&gt;Knowing whether a target runs WordPress, Drupal, or a custom framework — and whether Cloudflare is present — directly shapes your attack surface analysis. Different stacks mean different CVEs, different misconfigs, different paths forward.&lt;/p&gt;




&lt;h3&gt;
  
  
  7. &lt;code&gt;wafw00f&lt;/code&gt; — Detect the WAF Early
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;wafw00f https://target.com
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Discover whether a Web Application Firewall is present &lt;em&gt;before&lt;/em&gt; you do anything active. If a WAF is there, your scans need to be calibrated accordingly. Better to know now than get your IP flagged mid-recon.&lt;/p&gt;




&lt;h3&gt;
  
  
  8. Sublist3r — Subdomain Enumeration via OSINT
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;python sublist3r.py &lt;span class="nt"&gt;-d&lt;/span&gt; target.com
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Pulls subdomains from Google, Bing, VirusTotal, and other OSINT sources without touching the target directly. Add &lt;code&gt;-b&lt;/code&gt; for brute force — but only if the program scope explicitly allows active testing.&lt;/p&gt;




&lt;h3&gt;
  
  
  9. theHarvester — Emails, Subdomains, and Hosts
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;theHarvester &lt;span class="nt"&gt;-d&lt;/span&gt; target.com &lt;span class="nt"&gt;-b&lt;/span&gt; google
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;One of the best all-in-one OSINT tools available. Pulls email addresses, hostnames, and subdomains from multiple search engines simultaneously. The email data alone helps map org structure and flag accounts worth checking in breach databases.&lt;/p&gt;




&lt;h3&gt;
  
  
  10. Have I Been Pwned
&lt;/h3&gt;

&lt;p&gt;🔗 &lt;a href="https://haveibeenpwned.com" rel="noopener noreferrer"&gt;haveibeenpwned.com&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Enter emails associated with the target and check for known data breach appearances. This tells you how realistic credential stuffing or password reuse attacks might be — and it's 100% passive.&lt;/p&gt;




&lt;h3&gt;
  
  
  11. Google Dorks + GHDB — The OSINT Goldmine
&lt;/h3&gt;

&lt;p&gt;Google Dorks use search operators (&lt;code&gt;site:&lt;/code&gt;, &lt;code&gt;inurl:&lt;/code&gt;, &lt;code&gt;filetype:&lt;/code&gt;, &lt;code&gt;intitle:&lt;/code&gt;) to surface specific types of accidentally exposed data. The &lt;a href="https://www.exploit-db.com/google-hacking-database" rel="noopener noreferrer"&gt;Google Hacking Database (GHDB)&lt;/a&gt; on Exploit-DB is a curated library of dorks organized by what they find.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What dorks can surface:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Exposed credentials and private keys&lt;/li&gt;
&lt;li&gt;Publicly indexed config files (JSON, YAML, .env)&lt;/li&gt;
&lt;li&gt;Admin panels and VPN login portals&lt;/li&gt;
&lt;li&gt;Indexed logs and database backups&lt;/li&gt;
&lt;li&gt;Devices running on default pages&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Example patterns to study:&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;site:github.com "BEGIN OPENSSH PRIVATE KEY"
intext:"aws_access_key_id" filetype:json
intitle:"index of" /etc/ssh
intitle:"SSL Network Extender Login" -checkpoint.com
site:.edu filetype:xls "root" database
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;blockquote&gt;
&lt;p&gt;⚠️ &lt;strong&gt;Legal reminder:&lt;/strong&gt; Use Google Dorks only within authorized scope. Finding and accessing leaked credentials or private keys on unauthorized systems can have serious legal consequences. If you discover sensitive data, follow your program's responsible disclosure process.&lt;/p&gt;
&lt;/blockquote&gt;




&lt;h2&gt;
  
  
  The Mindset That Makes This Actually Work
&lt;/h2&gt;

&lt;p&gt;Passive recon isn't a box you tick before the "real" hacking starts.&lt;/p&gt;

&lt;p&gt;It &lt;em&gt;is&lt;/em&gt; real hacking.&lt;/p&gt;

&lt;p&gt;The researchers consistently finding high-severity bugs aren't the ones who jumped straight to fuzzing. They're the ones who spent 45 minutes here first — and came out knowing the full tech stack, subdomain spread, WAF presence, interesting paths, and whether org credentials have already leaked somewhere.&lt;/p&gt;

&lt;p&gt;That map changes everything about what you do next.&lt;/p&gt;




&lt;h2&gt;
  
  
  TL;DR — The Passive Recon Checklist
&lt;/h2&gt;

&lt;p&gt;If you're just getting started, go in this order:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Step&lt;/th&gt;
&lt;th&gt;Tool&lt;/th&gt;
&lt;th&gt;What You're Looking For&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;1&lt;/td&gt;
&lt;td&gt;&lt;code&gt;robots.txt&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Hidden or sensitive paths&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2&lt;/td&gt;
&lt;td&gt;&lt;code&gt;sitemap.xml&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Forgotten endpoints and pages&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3&lt;/td&gt;
&lt;td&gt;&lt;code&gt;whois&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Registrar info, related domains&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4&lt;/td&gt;
&lt;td&gt;DNSDumpster&lt;/td&gt;
&lt;td&gt;Subdomain and DNS footprint&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5&lt;/td&gt;
&lt;td&gt;WhatWeb / Wappalyzer&lt;/td&gt;
&lt;td&gt;Tech stack fingerprint&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6&lt;/td&gt;
&lt;td&gt;&lt;code&gt;wafw00f&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;WAF detection&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;7&lt;/td&gt;
&lt;td&gt;Sublist3r&lt;/td&gt;
&lt;td&gt;Full subdomain enumeration&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;8&lt;/td&gt;
&lt;td&gt;theHarvester&lt;/td&gt;
&lt;td&gt;Emails, hosts, subdomains&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9&lt;/td&gt;
&lt;td&gt;Have I Been Pwned&lt;/td&gt;
&lt;td&gt;Breach and credential exposure&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10&lt;/td&gt;
&lt;td&gt;Google Dorks + GHDB&lt;/td&gt;
&lt;td&gt;Exposed files, panels, configs&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;Add tools as they start making sense. The goal isn't running every tool on the list — it's building a real, accurate picture of the attack surface before you ever touch it.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;Found this useful? I write about bug bounty, OSINT, and offensive security regularly. Follow along if that's your thing — and drop a comment with your favourite passive recon tool I might have missed.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>bugbounty</category>
      <category>osint</category>
      <category>cybersecurity</category>
    </item>
  </channel>
</rss>
