/R3CON

Just some bash scripting to help your recon.

Primary LanguageShell

R3CON

made-with-bash GitHub issues GitHub code size in bytes

I have created a bunch of shell scripts to help you up with your recon. These simple script will help you get all the subdomains and see all the alive subdomains out of all the subdomains we get.

Prerequisites

Usage

git clone https://github.com/sahildari/R3CON
cd R3CON
chmod +x *.sh
sudo bash subdomain.sh target.com

Please specify the full path of extract.rb in endpoint.sh

For example if you have cloned the R3CON in your /opt/ directory then change the 11th line to ruby /opt/R3CON/extract.rb scriptsresponse/$domain/$file >> endpoints/$domain/$file

  • It will create alive.txt and alive.json in which all the alive subdomains will be listed.
  • It will create headers directory to store the file by trying Open-redirect via X-Forwarded-Host: evil.com
  • It will create script and scriptresponse directories to store all the js files related to the target and subdomains of the target (Where all the gold relies).
  • It will create endpoints directories to store the intereting endpoints it will find.
  • After all this you can use your manual searching for the things you want(grep)

Example for Manual searching :

  • grep -iErn 302 to search what subdomains encountered the redirection and then check those subdomains manually
  • grep -iErn admin
  • grep -iErn secret-key

and you get the point. :)

Happy Hacking!

Acknowledgements

R3CON framework have been created by using the open source security tools made by these amazing OPEN SOURCE security community -