Recon robin is a recon tool used to automate the recon proccess.
Given a domain, Recon Robin will
- Grab all unique subdomains from crt.sh
- Grab all unique subdomains from virustotal
- Grab all unique domains that it can find in any DNS record
To use this, you need to do the following:
- Be on linux or another system that has the
dig
command - Create a file called
secrets.json
with your virustotal API key (can be community version) - Install the
requests
module in pythonpip install requests
The secrets.json
should be formated like this:
{
"virus_total_api_key": "f5533xxxxxxxxxxxxxxxxxxxxxxxxxx41704",
"shodan_api_key":"Lxxxxxxxxxxxxxxxxxxxxxxxx1Zbl9",
"censys_api_id": "xxxxxxx-xxxx-xxxx-xxxx-xxxxxxx",
"censys_api_secret": "12BsxxxxxxxxxxxxKOM"
}
- Run recon robin:
python recon_robin.py
- Write all the domains you want to recon in a comma seperated list, for example:
github.com, gitlab.com, bitbucket.com
- Click enter, sit back and watch recon robin grab the domains
NOTE: When you use the list that contains DNS requests, you have to check that there are no out of scope targets. The code just parses DNS records, so you might find DNS related domains, that are not in scope / owned by your client.
- Run recon robin:
python recon_robin.py --dns-only
- You can optionally add a
--ip <ip address>
to spesicy what dns server you want to query - Write all the domains you want to recon in a comma seperated list, for example:
github.com, gitlab.com, bitbucket.com
- Click enter, sit back and watch recon robin grab the domains