Skip to content

Commit a564ea6

Browse files
authored
Update README.md
1 parent c5af3e1 commit a564ea6

File tree

1 file changed

+6
-5
lines changed

1 file changed

+6
-5
lines changed

README.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,7 @@ Recon is an essential element of any penetration testing. This repository contai
2525
* [Assetfinder](https://github.com/tomnomnom/assetfinder)
2626
* [Subjack](https://github.com/haccer/subjack)
2727
* [httprobe](https://github.com/tomnomnom/httprobe)
28+
* [Corsy](https://github.com/s0md3v/Corsy)
2829
* [Aquatone](https://github.com/michenriksen/aquatone)
2930
* [curl](https://curl.haxx.se/)
3031
* [relative-url-extractor](https://github.com/jobertabma/relative-url-extractor)
@@ -37,15 +38,15 @@ Recon is an essential element of any penetration testing. This repository contai
3738
# How does it work?
3839
The script has 5 phases:
3940

40-
1. Subdomain enumeration: Amass, Certsh.py, Github-subdomains.py, Gobuster DNS and Assetfinder tools are used to find the maximum possible number of subdomains. httprobe is used to probe for working http and https servers. Then Subjack is used to quickly check if it exists subdomains takeover. Finally, Aquatone takes screenshots of each subdomain.
41+
1. Subdomain enumeration: Amass, Certsh.py, Github-subdomains.py, Gobuster DNS and Assetfinder tools are used to find the maximum possible number of subdomains. httprobe is used to probe for working http and https servers. Then Subjack is used to quickly check if it exists subdomains takeover. Corsy tool is used to find CORS missconfigurations. Finally, Aquatone takes screenshots of each subdomain.
4142

42-
2. Headers: curl is used to obtain the headers of each subdomain.
43+
2. Javascript: relative-url-extractor and Jsearch.py are used to inspect the javascript files of each subdomain for endpoints and sensitive information.
4344

44-
3. Javascript: relative-url-extractor and Jsearch.py are used to inspect the javascript files of each subdomain for endpoints and sensitive information.
45+
3. Directories and hidden files: Gobuster DIR is used to collect hidden files and directories through a dictionary. You can change the dictionary in the script configuration.
4546

46-
4. Directories and hidden files: Gobuster DIR is used to collect hidden files and directories through a dictionary. You can change the dictionary in the script configuration.
47+
4. Nmap: Nmap is used to scan ports and services quiclky.
4748

48-
5. Nmap: Nmap is used to scan ports and services quiclky.
49+
5. Headers: curl is used to obtain the headers of each subdomain.
4950

5051
### All the data generated in the different processes are saved in different files and directories in different formats.
5152
![Example image](https://raw.githubusercontent.com/robotshell/magicRecon/master/example.png)

0 commit comments

Comments
 (0)