Skip to content

bvoris/RedTeamRecon

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

16 Commits
 
 
 
 
 
 

Repository files navigation

RedTeamRecon

Created by: Brad Voris
GitHub GitHub commit activity GitHub All Releases GitHub repo size GitHub language count GitHub issues GitHub top language

Red Team Reconnaissance Tool for Windows systems

Red Team Recon is a red team tool to be run on Windows Systems for reconnaissance gathering

This tool will require escalated privileges

To be used for demonstration purposes only

RedTeamRecon will gather the following information:

Hostname, OS information, BIOS, physical hardware, recent hotfixes, local users and groups, local privilege information, complete network information (interfaces, IP v4/v6 stack, routes, active connections) WiFi profiles (profile name, SSID, Connection, Encryption, Pre-Shared Keys), Current running Processes, writable directory information, local firewall profiles, local share information, any locally stored clear-text credential strings.

***Updated 1/25/2022 with cmdkey /savecred /list /pass

How to use RedTeamRecon

Download the recon.txt file to the local machine

Rename the file to recon.bat and run with escalated privilege command prompt

If file cannot be loaded as a batch file:

Open a Command Prompt

Go to the file location

type cmd < recon.txt

Once the file has been executed a new file will be created at c:\TMP\systemdata.cfg with detailed host information.

c:\TMP\systemdata.cfg will contain the all of the information from the recon.

Special thanks to 0xsp & Morph3Sec for syntax and recommended commandlines for reconnaissance https://0xsp.com/offensive/red-ops-techniques/red-team-cheatsheet

Connect with me at





Victim Of Technology

Cyber Forge Security, Inc.

About

Red Team Reconnaissance Tool for Windows systems

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published