Skip to content

EmilienPer/HackRecon

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

44 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

PyPi License Documentation Status Known Vulnerabilities Donate Beerpay

Table of Contents

HackRecon

Project URL : https://github.com/EmilienPer/HackRecon

HackRecon was created to be used for OSCP certification. This tool (inspired by the "reconnoitre" tool: https://github.com/codingo/Reconnoitre) makes it possible to scan hosts finally to obtain a maximum of information on these. It is therefore a recognition tool. Its mechanism can be summarized as follows:

For each host:

  • Create the exploit, proof and scan folders required for OSCP certification
  • Determine open ports and related services
  • For each port:
    • List exploits related to the product using the port
    • Start scans according to the protocol
    • Suggest additional scans asking for human intervention or other exploits
  • Write an analysis report (HTML and XML format)

Requirement

HackRecon run on Python 2.7 can't work correctly without the following tools

  • Nmap
  • smtp-user-enum
  • whatweb
  • nikto
  • dirb

Installation

sudo pip install hackrecon

Options

Shortcut option Required Default Description
X The Ip(s) address of the host
-o --output . The output directory
-t --max_threads 5 The maximum number of host handled in the same time
--cache False Use cache
-a --all False Scan all ports
--css The CSS file to use into the HTML report
--javascript_header The javascript file to use into the header of the HTML report
--javascript_tail The javascript file to use into the end of the HTML report
--full Use all nmap nse scrip for the protocol. The value can be "all" or a list of protocol separated by ";"

Usage

The param can be

  • An IPv4 address (example: 192.168.0.1)
  • An range of IPv4 addresses (example: 192.168.0.0/24 or 192.168.0.1-254)
  • A list of IPv4 address separated by ";" (example: 192.168.0.1;198.162.0.2)

Example:

  • hackrecon 192.168.0.1 -o /root/,
  • hackrecon 192.168.0.0/24 -o /root/
  • hackrecon 192.168.0.1-254 -o /root/
  • hackrecon 192.168.0.1;198.162.0.2 -o /root/
  • hackrecon 192.168.0.1 -o /root/ -t 5 --cache --all
  • hackrecon 192.168.0.1 -o /root/ --javascript_header javascript_file.js --javascript_tail other_file.js --css shett.css
  • hackrecon 192.168.0.1 -o /root/ -t 5 --cache --all --full all
  • hackrecon 192.168.0.1 -o /root/ -t 5 --cache --all --full http;ssh;smb

Example

Example of usage can be found in the "examples" directory

Issues management

For contributions or suggestions, please open an Issue and clearly explain, using an example or a use case if appropriate.

About

Reconnaissance tool

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages