* **Presidente de EE. UU. (POTUS)**
* **Secretary of Defense (SecDef)**
* **Department of Defense (DoD)** - [[https://www.defense.gov|defense.gov]]
* **Joint Chiefs of Staff (JCS)** - [[https://www.jcs.mil|jcs.mil]]
* **Fuerzas Armadas**
* **U.S. Army** - [[https://www.army.mil|army.mil]]
* **U.S. Navy** - [[https://www.navy.mil|navy.mil]]
* **U.S. Marine Corps** - [[https://www.marines.mil|marines.mil]]
* **U.S. Air Force** - [[https://www.af.mil|af.mil]]
* **U.S. Space Force** - [[https://www.spaceforce.mil|spaceforce.mil]]
* **U.S. Coast Guard** - [[https://www.coastguard.mil|coastguard.mil]]
* **Comandos Combatientes Unificados**
* **CENTCOM** - [[https://www.centcom.mil|centcom.mil]]
* **EUCOM** - [[https://www.eucom.mil|eucom.mil]]
* **INDOPACOM** - [[https://www.indopacom.mil|indopacom.mil]]
* **AFRICOM** - [[https://www.africom.mil|africom.mil]]
* **SOCOM** - [[https://www.socom.mil|socom.mil]]
* **STRATCOM** - [[https://www.stratcom.mil|stratcom.mil]]
* **Agencias del DoD**
* **DARPA** - [[https://www.darpa.mil|darpa.mil]]
* **Defense Logistics Agency (DLA)** - [[https://www.dla.mil|dla.mil]]
* **Defense Contract Audit Agency (DCAA)** - [[https://www.dcaa.mil|dcaa.mil]]
* **Defense Technical Information Center (DTIC)** - [[https://discover.dtic.mil|discover.dtic.mil]]
* **Defense Manpower Data Center (DMDC)** - [[https://dwp.dmdc.osd.mil|dwp.dmdc.osd.mil]]
**Extraemos todas las webs y eliminamos el protocolo para poder dárselas a hackertarget**\\
curl 'https://wiki.acosadores.net/doku.php?id=estados-unidos:mapa' | grep -Eio '([a-z]+\.){2,4}(mil|gov)' | sort | uniq > urls_usa_sin_protocolo.txt
**Creamos un script para hackertarget que automatice el proceso de ir dominio por dominio**\\
#! /bin/bash
# Crea el archivo commands_usa
echo "workspaces create usa" > commands_usa
echo "workspaces load usa" >> commands_usa
echo "modules load recon/domains-hosts/hackertarget" >> commands_usa
# Iterar sobre cada dominio en usa_gov_sin_protocolo.txt
while read domain; do
echo "options set SOURCE $domain" >> commands_usa
echo "run" >> commands_usa
done < usa_gov_sin_protocolo.txt
Le damos permisos de ejecución con chmod +x script_usa.sh, ejecutamos con ./script_usa.sh y crea el fichero commands_usa
después hacemos:
recon-ng -r /home/usuario/commands_usa (tiene que ser ruta completa, no puede ser ruta relativa porque da error) \\
[recon-ng][usa][hackertarget] > spool start /home/usuario/volcado_usa.txt\\
[*] Spooling output to '/home/usuario/volcado_usa.txt'.\\
[recon-ng][usa][hackertarget] > show hosts (no sacamos mucho, sólo las ips)\\
[recon-ng][usa][hackertarget] > spool stop\\
[*] Spooling stopped. Output saved to '/home/usuario/volcado_usa.txt'.