The purpose of O.G. Auto-Recon is to automate the initial information-gathering phase and then enumerate based on those results as much as possible. This tool is intended for CTF's and can be fairly noisy. (Not the most stealth conscious tool...) All tools in this project are compliant with the OSCP exam rules. Command syntax can be easily modified in the Config settings. $variable names should remain unchanged. If Virtual Host Routing is detected, O.G. Auto-Recon will add the hostnames to your /etc/hosts file and continue to enumerate the newly discovered hostnames. DNS enumeration is nerfed to ignore .com .co .eu .uk domains etc... since this tool was designed for CTF's like for instance, "hack the box". It will try to find the most .htb domains if DNS servers are detected.. This project uses various stand-alone & custom tools to enumerate a target based on Nmap results. All Commands and output are logged to a Report folder in the users ~/.local/share/autorecon/report directory using the naming context, "report/IP-ADDRESS/" which will look something like, report/10.10.10.108/ with a directory tree structure similar to this report tree structure
INSTALLATION
cd /opt
git clone https://github.com/Knowledge-Wisdom-Understanding/recon.git
cd recon
chmod +x setup.sh
./setup.sh
python3 setup.py install
Usage
_____________ ____ ________________
/___/___ \ / / | /___/__ \ Mr.P-Millz _____
O.G./ / _ \______/__/ |______|__|_____ * \_________________/__/ |___
__/__/ /_\ \ | | \....
Author
- Hakin9 is a monthly magazine dedicated to hacking and cybersecurity. In every edition, we try to focus on different approaches to show various techniques - defensive and offensive. This knowledge will help you understand how most popular attacks are performed and how to protect your data from them. Our tutorials, case studies and online courses will prepare you for the upcoming, potential threats in the cyber security world. We collaborate with many individuals and universities and public institutions, but also with companies such as Xento Systems, CATO Networks, EY, CIPHER Intelligence LAB, redBorder, TSG, and others.
- LiveSeptember 5, 2024"40 Steps" Satellite Security - Registration for LIVE WORKSHOP IS NOW ON!
- LiveAugust 21, 2024"40 Steps" Game Hacking - Registration for LIVE WORKSHOP IS NOW ON!
- BlogDecember 13, 2022What are the Common Security Weaknesses of Cloud Based Networks?
- BlogOctober 12, 2022Vulnerability management with Wazuh open source XDR