Sie sind auf Seite 1von 9

Danny Ghazal

10/8/20
NTS330
Mike Vasquez
Recon

Step 1:

What is the name of the organization you chose? What do they do?

I chose Tesla, Tesla sells fully electric cars and has a space program as well.

What operating systems do they use on their web server? Why?

Tesla uses a BigIP web server.

Curl -s -I tesla.com | grep Server

What web server are they using (Apache, IIS, etc.)? What version is it?

Apache is the web server but the version isn’t specified

Does it appear they are hosting their own web server?

There isn’t enough information to confidently state weather they are or they aren’t the
curl command only gave very limited information

What programming languages are used on the site?

The front end of the website is made with java script I went on the tesla website and
used inspect element to check what the file extensions were. I’m assuming they are
probably using a different language for the backend I tried looking for it but couldn’t find
anything.

What are the networks in use by the organization? List Ranges?

Whois -h whois.apnic.net Tesla


https://ip-netblocks.whoisxmlapi.com/lookup-report/Jd95pO72pB

Does it appear they are hosting any other services from their network ranges? (Do Not
Scan network segments)

Yes it does appear that they have other services there are tons of different network
segments listed on ip-netblocks.whoisxmlapi.com

What type of information did you turn up using search engines?

Using search engines I was able to find some information out about the IP blocks that
tesla owns. I tried finding other information about network infrastructure but couldn’t
get much without performing scans.

Step 2:

Identify key employees. Get names, positions, salary, phone #, and e-mail addresses.

Mike Anderson/ mikeanderson@tesla.com

Yoni Ramon/ yoni@tesla.com

Gagan Sachdev/ gsachdev@tesla.com

Siddhartha Maddi/ simaddi@tesla.com

Haim Grosman/ hgrosman@tesla.com

Elon Musk/ elon@tesla.com

James Glenn/ jglenn@tesla.com

Axel Faltin/ afaltin@tesla.com

David Wuertele/ dwuertele@tesla.com

Justin James/ jjames@tesla.com


Sam Vilain/ svilain@tesla.com

Additional:

noc@teslamotors.com

whoisrequest@markmonitor.com

admin@dnstinations.com

abusecomplaints@markmonitor.com

Phone Numbers:

1-(800)-745-9229

1-(415)-531-9336

44-(20)-3206-2220

1-(415)-531-9335

1-(208)-389-5770

1-(208)-389-5740

Additional Domains:

Events.tesla.com

Ir.tesla.com

mfa.tesla.com

Apac-sso.tesla.com

Secureguest.tesla.com

Auth.tesla.com

Beta-partners.tesla.com
Cicerone.tesla.com

Email.tesla.com

Email1.tesla.com

emails.tesla.com

epcapi.tesla.com

Do they participate in any professional organizations?

Elon Musk if apart of SpaceX, the boring company, and solar city

Do they participate in any professional social media sites?

They all have a Linkd In I couldn’t find any other professional social media sites these
people are linked to

Is anyone looking for a job?

No

Can you locate interesting corporate documentation, passwords, etc...?

I used google dorking to try and find passwords, PDF’s, and docx files

The commands used were allintitle:password inurl:tesla filetype:log/pdf/docx after:2019

Each search I tried came up with no results

Does your target company have any associations with other companies? E.g.partners

● AGC Automotive: windshields.


● Brembo: brakes.
● Fisher Dynamics: power seats.
● Inteva Products: instrument panel.
● Modine Manufacturing Co.: battery chiller.
● Sika: acoustic dampers.
● Stabilus: liftgate gas spring.
● ZF Lenksysteme: power steering mechanism.

Tesla also has a partnership with LG because they produce batteries

Enumerate your targets Domain Name. Document all additional IP addresses that you
have discovered. (Add them to your current list)

https://ipinfo.io/AS394161

Netblock Description Num IPs

199.120.48.0/24 Tesla Motors, Inc. 256

199.120.49.0/24 Tesla Motors, Inc. 256

199.120.50.0/24 Tesla Motors, Inc. 256

199.120.51.0/24 Tesla Motors, Inc. 256

199.66.10.0/24 Tesla, Inc. 256

199.66.11.0/24 Tesla, Inc. 256

199.66.9.0/24 Tesla, Inc. 256

205.234.11.0/24 Tesla 256

209.133.79.0/24 Tesla, Inc. 256

213.19.141.0/24 CUSTOMER-LAN 256

213.244.145.0/24 CUSTOMER LAN 256


62.67.197.0/24 Customer LAN 256

8.21.14.0/24 Level 3 Parent, LLC 256

8.45.124.0/24 Level 3 Parent, LLC 256

Use theharvester, available in your Kali Linux virtual machine, to search your company's
domain, e-mail, social media, etc....

save the email address into a text file.

save the hosts into a text file.

I used theHarvester to scan tesla.com domain and didn’t receive any results

help:

https://github.com/laramies/theHarvester

(Links to an external site.)

http://www.edge-security.com/theharvester.php

(Links to an external site.)

Create a visual map of your selected target's discovered systems. Identify network
address ranges, possible target systems and their purpose, routers, switches, etc...... Is
this their DMZ?

https://ip-netblocks.whoisxmlapi.com/lookup-report/Jd95pO72pB
I used Maltego to get a layout of the webdomains infrastructure this also provided
emails, alternate domains, social medias, and IP blocks.

Document your advanced Google search strings and their results.

Step 3

Using Recon-NG perform a full recon on your target company. Document your results.
Did you find any additional useful or interesting info.

I ran the hackertarget module within recon-ng and was unable to find any new
information that wasn’t available within maltego

https://bitbucket.org/LaNMaSteR53/recon-ng/wiki/Usage%20Guide

(Links to an external site.)

Use at least the following modules. You will need to get API keys...

Showdan

recon/domains-hosts/shodan_hostname
https://developer.shodan.io/

(Links to an external site.)

Bing

https://msdn.microsoft.com/en-us/library/bing-ads-getting-started.aspx

(Links to an external site.)

help

https://bitbucket.org/LaNMaSteR53/recon-ng

(Links to an external site.)

http://securenetworkmanagement.com/recon-ng-tutorial-part-1/

(Links to an external site.)

http://securenetworkmanagement.com/recon-ng-tutorial-part-2/

(Links to an external site.)

http://securenetworkmanagement.com/recon-ng-tutorial-part-3/

(Links to an external site.)

You need to research information that would be helpful for the social engineering
phase of your penetration test.

Physical layout of the company.

Security doors, guards, cameras, etc.....

Badges?

Vehicle passes?

Web Cams?
Digital dumpster diving.

How does the typical employee dress? Dress code?

At the end of your paper answer the following questions:


1. Is there anything that you found particularly useful or juicy during your
second phase of your information gathering exercise?
2. What tools and web sites did you use during this lab exercise?

Das könnte Ihnen auch gefallen