Perform structured reconnaissance and attack surface enumeration for authorized penetration tests, CTF challenges, and bug bounty programs. Use when the user mentions 'recon,' 'reconnaissance,' 'enumerate,' 'attack surface,' 'subdomain enumeration,' 'port scan,' 'fingerprint,' 'asset discovery,' or needs to map a target's external footprint.
72
88%
Does it follow best practices?
Impact
—
No eval scenarios have been run
Advisory
Suggest reviewing before use
Perform structured reconnaissance against an authorized target, organizing findings into an actionable attack surface map.
Before running any commands, confirm:
If authorization is unclear, ask before proceeding. Never assume authorization.
Gather information without touching the target directly.
DNS enumeration:
dig any $ARGUMENTS for A, AAAA, MX, TXT, NS, CNAME recordsdig axfr @ns-server $ARGUMENTScurl -s "https://crt.sh/?q=%25.$ARGUMENTS&output=json" | jq -r '.[].name_value' | sort -uWHOIS and registration: Run whois $ARGUMENTS for registrant, nameserver, and creation date info.
Search engine dorking: Use targeted queries — site:, inurl:, filetype:, intitle: — to find exposed pages, documents, and admin panels.
Technology fingerprinting: Identify frameworks, CMS, server software, and JavaScript libraries from public-facing pages.
Public code repositories: Search GitHub/GitLab for the target's org name, domain, API keys, or internal paths.
Historical data: Check the Wayback Machine for old endpoints, removed pages, and configuration files.
Port scanning:
nmap -sC -sV -oN scan-results.txt $ARGUMENTSStart with top 1000 ports. Expand to full range (-p-) if needed. Use -Pn if the host appears down but is in scope.
Service enumeration: Based on open ports, probe for version info and default configurations.
Web content discovery:
/api/, /v1/, /graphql, /swagger.json)SSL/TLS analysis: Run testssl.sh or sslyze to check for weak ciphers, expired certificates, and misconfigurations.
Correlate all findings. Identify the most promising attack vectors and prioritize by:
Produce a structured recon report:
# Recon Report
## Target: [target]
## Scope: [confirmed scope]
## Date: [date]
### Passive Findings
| Finding | Details | Relevance |
|---------|---------|-----------|
### Subdomains Discovered
- [list]
### Technologies Detected
- [list with versions where identified]
### Active Findings
| Port | Service | Version | Notes |
|------|---------|---------|-------|
### Attack Surface Summary
[Prioritized list of interesting findings with risk assessment]
### Recommended Next Steps
[Ordered list of what to investigate further]2400590
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.