You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+8-5Lines changed: 8 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,12 +4,14 @@
4
4
Recon is an essential element of any penetration testing. This repository contain a powerful shell script to maximize the recon and data collection process of an objective. With this script you can easily find:
5
5
6
6
* Sensitive information disclosure.
7
+
* Missing HTTP headers
7
8
* Open S3 buckets.
8
9
* Subdomain takeovers.
9
10
* Open ports and services.
10
11
* Endpoints.
11
12
* Directories.
12
13
* Javascript files with senstive info
14
+
* CORS missconfigurations
13
15
* Other quick bugs.
14
16
15
17
@@ -25,6 +27,7 @@ Recon is an essential element of any penetration testing. This repository contai
@@ -37,15 +40,15 @@ Recon is an essential element of any penetration testing. This repository contai
37
40
# How does it work?
38
41
The script has 5 phases:
39
42
40
-
1. Subdomain enumeration: Amass, Certsh.py, Github-subdomains.py, Gobuster DNS and Assetfinder tools are used to find the maximum possible number of subdomains. httprobe is used to probe for working http and https servers. Then Subjack is used to quickly check if it exists subdomains takeover. Finally, Aquatone takes screenshots of each subdomain.
43
+
1. Subdomain enumeration: Amass, Certsh.py, Github-subdomains.py, Gobuster DNS and Assetfinder tools are used to find the maximum possible number of subdomains. httprobe is used to probe for working http and https servers. Then Subjack is used to quickly check if it exists subdomains takeover. Corsy tool is used to find CORS missconfigurations. Finally, Aquatone takes screenshots of each subdomain.
41
44
42
-
2.Headers: curl is used to obtain the headers of each subdomain.
45
+
2.Javascript: relative-url-extractor and Jsearch.py are used to inspect the javascript files of each subdomain for endpoints and sensitive information.
43
46
44
-
3.Javascript: relative-url-extractor and Jsearch.py are used to inspect the javascript files of each subdomain for endpoints and sensitive information.
47
+
3.Directories and hidden files: Gobuster DIR is used to collect hidden files and directories through a dictionary. You can change the dictionary in the script configuration.
45
48
46
-
4.Directories and hidden files: Gobuster DIR is used to collect hidden files and directories through a dictionary. You can change the dictionary in the script configuration.
49
+
4.Nmap: Nmap is used to scan ports and services quiclky.
47
50
48
-
5.Nmap: Nmap is used to scan ports and services quiclky.
51
+
5.Headers: curl is used to obtain the headers of each subdomain.
49
52
50
53
### All the data generated in the different processes are saved in different files and directories in different formats.
0 commit comments