Tutorial: One Shot Passive Discovery

January 20, 2017 | Views: 6671

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

Estimated reading time: 1.5 minutes

When preparing for a penetration test, step one: Gather the information.

Let’s collect the information about the target by digging what is already available on the internet.  You may do Google search, whois, traceroute, advanced Googling and other stuff but let’s kill this with one shot. I have found a cool script which can come in handy to your rescue.

STEP 1: Installing the script

Getting into the directory where yo want to install this, I have chosen /opt directory.

  1. open the terminal
  2. cd /opt/
  3. git clone https://github.com/leebaird/discover.git

STEP 2: Running the script

  1. [ command – cd discover ]  You are set to rock now
  2. ./discover.sh


  • Choose 1 for domain discovery
  • Choose 1 for passive discovery
  • Input the company name and domain name


NOTE: For the first time let it run and see the processing: in my case the harvester scripts were postfixed with permission denied error, I went to usr/bin and found theHarvester.py file ad gave it executable permissions [command – chmod 777 theHarvester.py ]


  • Let it run, It will prompt you to press return when done.


STEP 3: Reporting

It will then open multiple tabs in firefox and an interactive web report as well, best part. You can browse through the report like a website easily.




  • Food for the brain: Figure out where the reports are getting stored

NOTE: Passive scanning can be done on any domain as we are only gathering the information which is freely available on the internet. We are just using the script to net all these fish.

Share with Friends
Use Cybytes and
Tip the Author!
Share with Friends
Ready to share your knowledge and expertise?
  1. Nice Streamlining – I love the command line, but this saves a lot of potential wasted time.

  2. Nice one thank you man 🙂

  3. Interesting. Very similar to theHarvester, with in tabs for ease of viewing and a diagram to show the relationship. I suppose for us heathens that hate command lines and like GUI stuff, it is okay. :>

Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge



Is Linux Worth Learning in 2020?
Views: 740 / December 14, 2019
How do I Get MTA Certified?
Views: 1312 / December 12, 2019
How much does your PAM software really cost?
Views: 1749 / December 10, 2019
How Do I Get into Android Development?
Views: 2139 / December 8, 2019

We recommend always using caution when following any link

Are you sure you want to continue?