- Subdomain emulation and Screenshot
- Masscan and nmap
- Cms scan
- Dirsearch and Wfuzz
- GitHub
- Webarchvie
- Js files emulation
Tools Used-
-
aquatone-discover -d domain
-
aquatone-scan -d domain
-
aquatone-takeover -d domain
-
aquatone-gather -d domain
- python3 Sublister.py -u domain
- masscan -p1-65535 10.1.1.149/32 --rate=10000
out put of masscan is taken to nmap to get details of open ports
- nmap -v -O -A -sV -sC -p22,3128 -oN 10.1.1.149_nmap.txt 10.1.1.149
for line in `cat /path-to-url`;
do
python3 cmseek.py -u $line --no-redirect
done
- Python3 dirsearch -L /path-to-urls -e * -b --plain-text-report=output.txt
- wfuzz -c -z file,/usr/share/dirbuster/wordlists/directory-list-2.3-small.txt --hc 404 http://domain/FUZZ
- GITROB_ACCESS_TOKEN=60f2675207b6c8c2aa3a2bfaadea1420b7be7021 ./gitrob dxa4481
- trufflehog git_url
- ./gitgot.py -q domain.com
- python waybackMachine.py facebook.com > facebook.txt
For single site -
- python linkfinder.py -d domain -o domain.html
For multiple sites -
for line in `cat /path-to-url`; do python linkfinder.py -d $line -o $line.html
Automating all the above scripts in to one
Save the below code as recon
and move it to /bin/recon and chmod +x recon
#!/bin/bash
aquatone-discover -d $1
aquatone-scan -d $1
aquatone-takeover -d $1
aquatone-gather -d $1
mkdir /home/mad/Documents/Recon/$1
python3 /home/mad/Sublist3r/sublist3r.py -d $1 -o /home/mad/Documents/Recon/$1/$1.txt
cat /home/mad/Documents/Recon/$1/$1.txt | ./gopath/bin/httprobe > /home/mad/Documents/Recon/$1/$1_live.txt
cat /home/mad/Documents/Recon/$1/$1_live.txt /home/mad/aquatone/$1/urls.txt | uniq > /home/mad/Documents/Recon/$1/final_urls.txt
python3 /home/mad/dirsearch/dirsearch.py -L /home/mad/Documents/Recon/$1/final_urls.txt -e * --plain-text-report=/home/mad/Documents/Recon/$1/dirsearch.txt
/home/mad/CMSeeK/sc > /home/mad/Documents/Recon/$1/cms_scan.txt
python /home/mad/waybackMachine/waybackMachine.py $1 > /home/mad/Documents/Recon/$1/wayback.txt