Skip to content
This tool is for automate the initial things that we usually do in daily pentesting. So you can focus more on the main target.
Branch: master
Clone or download
Latest commit 518fc81 Feb 25, 2019
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
Phase-list Bug_fixed Feb 25, 2019
results
screenshots Adding additional folders Sep 14, 2018
subdomains_list Rename Subdomains_list/Please_delete_me.txt to subdomains_list/Please… Nov 10, 2018
sublist3r
README.md
autorecon.py
bucket_finder.py Add_newmodule Feb 16, 2019
check_default_files.txt adding new files Sep 16, 2018
crawler.py Added_bucket grap Feb 22, 2019
find_default_files.py
geckodriver.exe
geckodriver.log
main_domain_testing.py
requirements.txt New_modules Feb 14, 2019
runner.py
virtual_host_testing.py

README.md

autoRecon

autoRecon is a automation tool which works on Phases which automates the manual process and give results in HTML file.

Features

--On the Main domain

1. It will try to find if the domain NS (name server) leaks some Zone transfer file or not.
2. It will try to find the Virtual host on that domain. So to give out info about "How many web application running on single IP". Remember please check if that domain is in scope or not.
3. It will try to parse the CSP header (if set). It will store the domains which are set on CS policy.
For ex. CSP:- default-src *.test.com www.test1.com test2.com
then it will parse it and store these domains like test.com, www.test1.com, test2.com then it will try to find the JSONp endpoints on those domains through the use of google.com, ask.com. (Intentionally for bypassing CSP).
4 Then it will try to crawl the target and try to find out the vulnerble URL for xss. (If any). Remember it will take one round for crawl.
5. Try to find S3 buckets.

--On the Sub-domains.

Phase 1: It will find the sub-domains through the use of the sublist3r.

Phase 2: It will find the status code of each sub-domain found by the sublist3r and make separate list of each sub-domain with their respective status code.

Phase 3: In this phase the tool will try to find the CNAME's entries of 404's sub-domains. NOTE: For this Phase, the main objective is to check for the SUBDOMAIN TAKE-OVER Vuln.

Phase 4: In this phase, through the use of Multi-threading, this tool will find the Port status (with Banner Grabbing) running on each Sub-domains. Note: The defined ports are "21, 22, 80, 8080, 443, 8443, 3306, 445". And it will make the two seperate list of URL's which have 21 port open and 80 port open.

Phase 5: In this phase the tool will find the *What CMS, Server, Frameworks and versions (if leaks) are using in the domain and Sub-domains.

Phase 6: In this Phase, if there is any FTP open found by "Phase 4", then it will try to get the Anonymous login.

Phase 7: In that phase it will find the URLs in the WayBack machine but whose domain status code is 401, 403. And will Capture screen-shots of way-back URLs.

Phase 8:- It will try to find default files for ex. phpinfo.php, htaccess.txt on each and every sub-domain.

Phase 9:- At last if any subdomain is using Cloudflare service then it will go for the DNS history for that subdomain.

Now lastly it will give you the results in HTML file.

Usage:

C:\>pip install requirements.txt
C:\>autoRecon.py -t domainname.com -f <anyfilename.txt> -o <anyfilename.html>

Note:

-t is for "Target" address and should be in this domainname.com format
-f is for "Filename", which is required by this tool. And should be in .txt extension.
-o is for "Result out-put HTML file"

Working Environment

Windows, Linux

Questions I used to asked myself.

Goal

The main aim for this tool is to Automate things, So that you can focus on other things as well.

Why I use Sub-lister

I use it because It covers mostly all site which we use to reveal the sub-domains. So, it gives a bunch of Sub domains.

What is the use of Phase-4 (nmap-scanning)

Off-course it will find the nmap ports of each sub domains. So if someone finds that there is a port open named FTP, from the bunch of many sub-domains then it has the high probability that it allows anonymously login. So it alerts you.

How Screenshots capture?

This phase uses Selenium, geckodriver for screenshots. Note:- You may see unusal data in the first run in Linux because it makes geckodriver in binary form.

Feedback

I am extremely waiting for your feedback about this tool.

Contact

agrawalsmart7

You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session.