Using nMap and Autonomous System numbers (ASN) for Discovery of GOODIES* (*maybe)

Hardcore Bug hunters will know that discovery is key, there are the top domains, primary domains and quick to find … and possibly more reward due to their standing online and impact to user … I want to share steps I take when doing recon to find interesting potential entry points

Autonomous System numbers (ASN) …
ASN Number = lots of IP Addresses associated with a company

If we look up a companies ASN we will get a pretty accurate reflection of their online estate.
I use bgp.he.net to find companies ASN’s …

check out this nmap script
nmap --script targets-asn --script-args targets-asn.asn=17012 > paypal.asn2ip.cleanme.txt

Starting Nmap 7.00 ( https://nmap.org ) at 2016-01-15 07:38 GMT
Pre-scan script results:
| targets-asn: 
|   17012
|     64.4.244.0/24
|     64.4.245.0/24
|     64.4.246.0/24
|     64.4.247.0/24
|     64.4.248.0/24
|     64.4.249.0/24
|     64.4.248.0/22
|     66.211.169.0/24
|     66.211.168.0/22
|     173.0.80.0/22
|     173.0.84.0/24
|     173.0.84.0/22
|     173.0.88.0/24
|     173.0.88.0/22
|     173.0.92.0/24
|     173.0.93.0/24
|     173.0.94.0/24
|     173.0.95.0/24
|_    173.0.80.0/20

wicked, clean up the output and save it with a meaningful name have a nice paypal.$date.target file
back to nmap…
there are a few things you can try from here if you want to go H.A.M then you might use the following:

nmap -p- -sV -iL paypal.target -oX paypal.allports.xml this will scan all tcp ports on all addresses in the paypal.target file you just prepared it will give you as much information about the services it finds as it can and save them to a nice xml file it will take a while, if you have an external box i’d recommend throwing it in a screen session and learning Mandarin while it scans, if you want to take the approach of common ports (rather than an absolute view of what IS open (at the time of scanning) you can ditch the -p- flag and replace it with -p80,443,8080 and what other ports you might care about … for example:
nmap -p80,443,8443,8080,8088,8010 -sV -iL paypal.target -oX paypal.common.web.ports.xml --open or what not

This will only return you open ports on IP Addresses, you will have to use your geekbrain to figure out what domains are associated with what IP addresses if that’s important, but it’s probably not.

more nMap discovery options: https://nmap.org/nsedoc/categories/discovery.html

Once we have the ASN we have obtained a reasonably informed list of the $targets online landscape. cool. once you have listed all your open ports you can see what might be worth moving to the next layer of discovery, such as Dirbuster/goBuster spidering and those web layer phases before you attHack

https://nmap.org/download.html


https://www.owasp.org/index.php/Category:OWASP_DirBuster_Project

etc…

5 Likes

Hi everyone , there any new " NSE script are available " send me link ?

ASN and expanding IP’s natural C blocks are awesome techniques when doing discovery =) Thanks for the writeup!

2 Likes

So why don’t you try something better than nmap? i usually use ASlookup.com, and it simplifies everything. You will get the same data in a few clicks. Or if you used to work with the command line check spyse.py

1 Like