OSINT Report on senselearner.com | Internship Task
OSINT: OSINT stands for Open Source Intelligence, and it refers to the process of collecting and analyzing information that is publicly available from open sources. Open sources include a wide range of publicly accessible information, such as websites, social media platforms, news articles, government reports, academic publications, and more.
This was the task assigned to each internee during our internship at Senselearner Technologies Pvt. Ltd. to conduct an Open Source Intelligence on the company's website. The purpose of this report was to conduct information gathering and reconnaissance activities on the website senselearner.com in a legal and ethical manner. The primary objective of these activities was to assess the security and analyze the associated risks. This report will serves as a crucial starting point for further security analysis and risk assessment. Based on these findings, recommendations made to enhance the website's security and mitigate potential vulnerabilities.
- Table of Contents
- Executive Summary:
- Introduction:
The purpose of this report is to conduct information gathering and reconnaissance activities on the website senselearner.com in a legal and ethical manner. The primary objective of these activities is to assess the security and analyze the associated risks. This report serves as a crucial starting point for further security analysis and risk assessment. Based on these findings, recommendations can be made to enhance the website's security and mitigate potential vulnerabilities.
- Domain Information
- DNS Footprinting:
Summarized the findings from DNS footprinting, including:
List of DNS Records: Provided information on A records, MX records, CNAME records, etc.
Subdomains: Enumerate any subdomains discovered.
Associated Services: Identified services or applications linked to DNS records.
- Web Footprinting: Detailed the results of web footprinting, such as:
Web Server Information: Identified the web server software and version.
Directory and File Structure: Documented directories or files discovered.
Technologies in Use: Listed content management systems (CMS), frameworks, or scripting languages used.
Metadata: Included metadata from web pages.
- Network and WHOIS Enumeration
Discussed network and WHOIS enumeration results:
Network Range: Noted the network range and IP addresses.
WHOIS Records: Included details from WHOIS records, such as the registrant's contact information. ASN Information: Mentioned Autonomous System Number (ASN) data.
- Open-Source Intelligence (OSINT):
- Vulnerabilities and Security Concerns:
- Recommendations:
Provided recommendations for addressing identified vulnerabilities or concerns.
- Conclusion:
(Summarized the key takeaways from the information gathering process and emphasized the significance of the findings.)
The information gathered through OSINT activities provides a comprehensive overview of senselearner.com, its infrastructure, technologies, and owner details. These findings are crucial for conducting a security assessment and risk analysis, identifying potential vulnerabilities, and developing appropriate security measures to protect the website and its assets. The report lays the groundwork for further investigation and security measures to safeguard the domain and its users
- Appendices:
Included additional information, screenshots, or data that support my findings in the report.
- References:
Listed all the sources and tools used during the information gathering process.
https://www.whois.com/whois/
https://builtwith.com/
https://www.nmmapper.com/sys/tools/subdomainfinder/
https://www.nslookup.io/
https://senselearner.com/
https://www.linkedin.com/company/senselearner-technologies-pvt-ltd/mycompany/
https://www.instagram.com/senselearner_technologies/
Command Prompt
Comments
Post a Comment