Imagine you're a detective investigating someone without them knowing. You'd check their social media, public records, maybe drive past their house - but never knock on the door. That's passive reconnaissance: gathering information without touching the target directly.
Why Passive First?
The OSINT Mindset
Good OSINT practitioners think like journalists. Every piece of information leads to another. A domain reveals registration info, which reveals an email, which reveals social profiles, which reveals technologies...
- Domain Info: Subdomains, DNS records, historical data
- Emails: Patterns, individual addresses
- Employees: Names, roles, social media
- Tech Stack: Software, frameworks, services
- Network: IP ranges, ASN, hosting providers
- Leaks: Credentials, code repos, documents
Domain Intelligence
WHOIS Lookups
Every domain has WHOIS records - like DMV records for websites. Many use privacy protection now, but older or internal domains often don't.
Subdomain Enumeration
Subdomains are goldmines: dev.company.com, vpn.company.com, staging.company.com - often poorly secured forgotten services.
DNS Records
TXT Records Talk
Google Dorking
Google is the most powerful OSINT tool. Special operators find information companies never intended to be discoverable.
Rate Limits
Email & Employee Intel
Common email patterns to guess:
- jsmith@company.com (initial + last)
- john.smith@company.com (first.last)
- john_smith@company.com (first_last)
Shodan - Hacker's Search Engine
Shodan indexes the entire internet. Search for services, vulnerabilities, and configurations without touching targets.
Code & Document Leaks
Methodology
Passive Recon Checklist
Knowledge Check
Challenges
Key Takeaways
- Passive recon leaves no trace - completely invisible to target
- Sources: WHOIS, DNS, search engines, social media, code repos
- CT logs are goldmines for subdomain discovery
- Google dorks reveal accidentally indexed sensitive files
- Shodan/Censys show internet-exposed services passively