Skip to content

sharathunni/auto-recon-ng

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

17 Commits
 
 
 
 
 
 
 
 

Repository files navigation

auto-recon-ng


AUTO RECON-NG - Automated script to run all modules for a specified list of domains, netblocks or company name

Source: https://bitbucket.org/LaNMaSteR53/recon-ng

Usage: auto_recon-ng.py [-h] -w WORKSPACE [-i FILENAME] [-m MODULENAME] [-company DBNAME1] [-domain DBNAME2] [-netblock DBNAME3]

Optional arguments:

-h, --help show this help message and exit

-w, --workspace WORKSPACE Workspace name

-i FILENAME Set the recon-ng source using this list

-m MODULENAME Specify the modules list

-company DBNAME1 Specify the file containing company names

-domain DBNAME2 Specify the file containing domain names

-netblock DBNAME3 Specify the file containing netblocks

Example: python auto-recon-ng -w recon_2018 -m modules.txt -domain domains.txt


Setting up Auto-recon-ng for sub-domain enumeration:

  1. Add API keys to Recon-ng:

i. Launch recon-ng

ii. Run the command keys list to view all the existing keys

iii. Add new API key using the command: keys add shodan_api <paste_key_here>

iv. Run keys list again and confirm that the keys were added

  1. List of API keys to be added for sub-domain enumeration:

Recon-ng will require API keys for using the below 3rd party services, register a new account and generate a new API key each time. Most of these services have rate limiting and will only allow certain number of requests per day.

Domain list: Create a text file containing the list of top domains in the working directory of auto-recon-ng. For example: bing.com microsoft.com

Modules list:

a. Subdomain Enumeration:

Create a text file containing the list of modules, for subdomain enumeration use the below list. When using the below list the “domain” option must be used with auto-recon-ng.

  • recon/domains-domains/brute_suffix
  • recon/domains-hosts/bing_domain_api
  • recon/domains-hosts/bing_domain_web
  • recon/domains-hosts/brute_hosts
  • recon/domains-hosts/builtwith
  • recon/domains-hosts/certificate_transparency
  • recon/domains-hosts/google_site_api
  • recon/domains-hosts/google_site_web
  • recon/domains-hosts/hackertarget
  • recon/domains-hosts/mx_spf_ip
  • recon/domains-hosts/netcraft
  • recon/domains-hosts/shodan_hostname
  • recon/domains-hosts/ssl_san
  • recon/domains-hosts/theharvester_xml
  • recon/domains-hosts/threatcrowd
  • recon/hosts-hosts/bing_ip
  • recon/hosts-hosts/ssltools
  • recon/hosts-ports/shodan_ip

b. Netblock to host discovery:

Create a text file containing the list of modules, for host enumeration use the below list. When using the below list the “netblock” option must be used with auto-recon-ng.

  • recon/netblocks-hosts/reverse_resolve
  • recon/netblocks-hosts/shodan_net
  • recon/netblocks-ports/census_2012
  • recon/netblocks-ports/censysio

About

Automated script to run all modules for a specified list of domains, netblocks or company name

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy