indexOffensive Security / Recon#cybersecurity#offensive-security#recon#index

Offensive Security / Recon Index

Purpose

This index is the root entry point for the offensive-security / recon branch of the cybersecurity vault.

Use it to: - structure attacker-style discovery and enumeration thinking - separate passive recon, active recon, enumeration, and validation workflows - connect reconnaissance to attack surface mapping, web security, and API security - build a repeatable operator mindset instead of ad hoc scanning

Use Reference Registry — Offensive Security as the source of truth for references in this branch. Return to Cybersecurity Index for root navigation across branches.

Before this branch: - Foundations (Phase 0). - Networking — the substrate every recon technique probes. - Attack Surface Mapping — recon turns surface into evidence. - Pair every note with its Detection Engineering counterpart.


Phase 1 — Recon foundations

  1. recon
  2. passive-recon
  3. active-recon

Phase 2 — Asset and technology discovery

  1. public-asset-discovery
  2. company-mapping
  3. tech-stack-fingerprinting

Phase 3 — Operational enumeration

  1. enumeration
  2. subdomain-enumeration
  3. host-and-port-discovery

Phase 4 — Validation and transition to testing

  1. scope-validation
  2. service-validation
  3. recon-to-testing-handoff
  4. cloaking-and-security-evasion

Core offensive / recon cluster

Branch maturity

This branch is depth-mature as of 2026-04-29.

All 12 atomic notes follow the canonical 11-section template, include practical labs, and now carry worked examples that turn discovered leads into validated evidence, scope decisions, and testing handoffs.

Foundations

Asset discovery

Enumeration

Validation and handoff

Scan engineering (depth)

Active Directory and identity attacks

Promoted to its own branch on 2026-05-10. See Identity and Active Directory for Kerberoasting, AS-REP Roasting, BloodHound, DCSync, and related notes.

Defender-side scan telemetry


Attack surface mapping

OSINT

Networking

Detection engineering

Wireless security

Cloud security

Web/API security

Security playbooks


Suggested future notes

Possible future playbooks

  • build-recon-pipeline
  • map-public-attack-surface
  • enumerate-admin-interfaces
  • validate-staging-hosts
  • enumerate-public-apis
  • trace-subdomain-ownership

Branch maintenance notes

  • Use reference-registry-offensive-security before adding references.
  • Keep this branch focused on discovery, validation, scope, and handoff.
  • Keep exploitation details in Web Security, API Security, or Security Playbooks.
  • zSecurity-derived OSINT topics now live in OSINT. Keep this branch focused on recon workflow and handoff.
  • zSecurity-derived wireless topics now live in Wireless Security. Keep this branch focused on general recon workflow and handoff.
  • zSecurity-derived cloud topics now live in Cloud Security. Keep this branch focused on general recon workflow and handoff.
  • Maintain the handoff pattern: every recon note should show how a raw clue becomes either validated context, a scoped test candidate, a no-action decision, or an owner/remediation path.

References

  • Foundational: OWASP WSTG latest — https://owasp.org/www-project-web-security-testing-guide/latest/
  • Research / Deep Dive: ProjectDiscovery recon series — https://projectdiscovery.io/blog/reconnaissance-a-deep-dive-in-active-passive-reconnaissance
  • Foundational: OSINT Framework — https://osintframework.com/