Passive Scanning with Free Online Tools [Resources for Hackers]

March 5, 2018 | Views: 4472

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

All white hat hackers should master different tools for different phases in penetration-testing (reconnaissance, scanning, gaining access, maintaining access, covering tracks/creating report). It takes months or maybe years to master all the tools for scanning.

A lot of information gathering and scanning can be done by active scanning using tools from Kali Linux distro. But if you want to master the field of scanning: try to play with passive scanning tools. Very useful if you don’t have your Kali Linux or command-line available.

Active scanning for system information and vulnerabilities can return great benefits, but can also return great headaches. If not done carefully, it can be an ineffective and inefficient way to gather information. The chance is high that traces of the scan can lead back to your scanning-host.

Passive scanning (there is no active or direct connection between your host and the target) can be less sensitive and can be a lighter touch on the network. It provides accurate, up-to-date information without a direct trace to your host. Passive scanning can be done with a lot of free quality online tools. Don’t forget to add these to your bookmarks.
Check also the topic about “hybrid-scanning” (combination of active and passive scanning).

Network tools, including whois, ping, traceroute, nslookup:
– https://www.robtex.com/
– https://whois.domaintools.com/
– https://mxtoolbox.com/
– https://centralops.net/co/
– https://ping.eu/

Scanning for DNS:
– http://www.dnsinspect.com/
– http://dnssec-debugger.verisignlabs.com/

Scanning for configuration and encryption:
– https://www.ssllabs.com/ssltest/
– mailserver encryption: https://ssl-tools.net/mailservers
– configuration with PCI DSS, NIST and HIPAA guidelines and requirements: https://www.htbridge.com/ssl/
– Dutch standards: https://internet.nl/
– securityheaders: https://securityheaders.io/
– HSTS: https://hstspreload.org/
– DMARC: https://dmarcian.com/dmarc-inspector/
– DOMXSS: http://www.domxssscanner.com/
– https://toolbar.netcraft.com/site_report
– https://observatory.mozilla.org/
– https://tls.imirhil.fr/

Scanning for SSL certificate:
– https://www.sslshopper.com/ssl-checker.html
– https://www.digicert.com/help/
– https://www.thesslstore.com/ssltools/ssl-checker.php
– https://cryptoreport.websecurity.symantec.com/checker/
– https://www.wormly.com/test_ssl
– https://sslanalyzer.comodoca.com/
– https://crt.sh/
– https://www.sslchecker.com/sslchecker

Scan for IPv6:
– https://ip6.nl/

Scanning your own client:
– for encryption: https://www.howsmyssl.com/
– for encryption: https://badssl.com/
– IPv6: http://test-ipv6.com/

Feel free to post additions and comments below.

Happy scanning!

Share with Friends
FacebookTwitterGoogle+LinkedInEmail
Use Cybytes and
Tip the Author!
Join
Share with Friends
FacebookTwitterGoogle+LinkedInEmail
Ready to share your knowledge and expertise?
3 Comments
  1. Thanks. Very useful

  2. Nice article with some very powerful tools.

  3. thanks very much for this post,

Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel