• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
iGuRu

iGuRu

Real-time Technology News. Opinions & Tweaks

  • / news
  • / infosec
  • / tools
  • / tweaks
  • / dummies
  • / opinions
  • / support
home / tools / OG AUTO-RECON: A Scanner based on Nmap

OG AUTO-RECON: A Scanner based on Nmap

22/06/2020 15:29 by Anastasis Vasileiadis

OG AUTO-RECON is an information collection program based on Nmap results.

recon - OG AUTO-RECON: A Scanner based on Nmap

Character

  • The purpose of the OG Auto-Recon is to automate the initial information gathering phase and then to list as much information as possible about its target based on these results.
  • This tool is intended for CTF and can be quite "noisy" but also useful.
  • All tools in this program comply with OSCP rules.
  • The syntax can be easily modified in the Config settings. The names of the variables should remain unchanged.
  • If a virtual routing path is detected, the OG Auto-Recon will add the hostnames to the / etc / hosts file and continue listing the hostnames.
  • DNS numbering is necessary to ignore .com .co .eu .uk, etc. domains… as this tool was designed for CTF such as hack the box. It will try to find most .htb domains if dns servers are detected.
  • This program uses various standalone & custom tools to enumerate a target, based on nmap results.
  • All commands and results are recorded in a reference directory in the user directory. /.Local/share/autorecon/report using the "report / IP-ADDRESS /" box. So the results will look like: report / 10.10.10.108 /

Installation

<span class="pl-c1">cd</chip> / opt
git clone https://github.com/Knowledge-Wisdom-Understanding/recon.git
<span class="pl-c1">cd</chip> recon
chmod + x setup.sh
./setup.sh
python3 setup.py 

Use

_____________ ____ ________________
      /___/___ \        /  / |  /___/__ \ Mr.P-Millz _____
      O.G./  /   _ \ ______/__/  |______|__|_____ *   \ _________________/__/  |___
       __/__/   /_ \ \ |  |  \ __ \/  _ \|  |       __/ __ \ _/ ___ \/  _ \|       |
      |   |     ___ \|  |  /|  | (  |_| )  |    |   \ ___/\ \ __(  |_| )   |   |
      |___|____/\ __ \ ____|____/_|__|\ _ \ ____/|__|____|_  /\ ___  |\ ___ \ ____/|___|  /
      gtihub.com/Knowledge-Wisdom-Understanding \ ___ \/  \ __ \/  \ __ \ _/ v3.6 \ ___ \/


usage:  autorecon -t 10.10.10.10

An Information Gathering and Enumeration Framework

optional arguments:
  -h, --help show this help message and exit
  -t TARGET, --target TARGET
                        Single IPv4 Target to Scan
  -F, --FUZZ auto fuzz found urls ending with .php for params
  -v, --version Show Current Version
  -f FILE, --file FILE File of IPv4 Targets to Scan
  -w [WEB], --website [WEB]
                        Get open ports for IPv4 address, then only Enumerate
                        Web && amp; and Dns Services. -t,--target must be specified.
                        -w, --web takes a URL as an argument. i.e. python3
                        recon.py -t 10.10.10.10 -w secret
  -i {http, httpcms, ssl, sslcms, aquatone, smb, dns, ldap, removecolor, oracle, source, sort_urls, proxy, proxycms, fulltcp, topports, remaining, searchsploit, peaceout, ftpAnonDL, winrm} [{http, httpcms, ssl, sslcms, aquatone, smb, dns, ldap, removecolor, oracle, source, sort_urls, proxy, proxycms, fulltcp, topports, remaining, searchsploit, peaceout, ftpAnonDL, winrm} ...], --ignore {http, httpcms, ssl, sslcms, aquatone, smb, dns, ldap, removecolor, oracle, source, sort_urls, proxy, proxycms, fulltcp, topports, remaining, searchsploit, peaceout, ftpAnonDL, winrm} [{http, httpcms, ssl, sslcms, aquatone, smb, dns, ldap, removecolor, oracle, source, sort_urls, proxy, proxycms, fulltcp, topports, remaining, searchsploit, peaceout, ftpAnonDL, winrm} ...]
                        Service modules to ignore during scan.
  -s {http, httpcms, ssl, sslcms, aquatone, smb, dns, ldap, removecolor, oracle, source, sort_urls, proxy, proxycms, fulltcp, topports, remaining, searchsploit, peaceout, ftpAnonDL, winrm} [{http, httpcms, ssl, sslcms, aquatone, smb, dns, ldap, removecolor, oracle, source, sort_urls, proxy, proxycms, fulltcp, topports, remaining, searchsploit, peaceout, ftpAnonDL, winrm} ...], --service {http, httpcms, ssl, sslcms, aquatone, smb, dns, ldap, removecolor, oracle, source, sort_urls, proxy, proxycms, fulltcp, topports, remaining, searchsploit, peaceout, ftpAnonDL, winrm} [{http, httpcms, ssl, sslcms, aquatone, smb, dns, ldap, removecolor, oracle, source, sort_urls, proxy, proxycms, fulltcp, topports, remaining, searchsploit, peaceout, ftpAnonDL, winrm} ...]
                        Scan only specified service modules
  -b {ftp, smb, http, ssh}, --brute {ftp, smb, http, ssh}
                        Experimental! - Brute Force ssh, smb, ftp, or http. -t,
                        --target is REQUIRED. Must supply only one protocol at
                        a team. For ssh, first valid users will be enumerated
                        before password brute is initiated, when no user or
                        passwords are supplied as options.
  -p PORT, --port PORT port for brute forcing argument. If no port specified,
                        default port will be used
  -in USER, --user USER Single user name for brute forcing, for SSH, if no
                        user specified, will default to
                        wordlists/usernames.txt and bruteforce usernames
  -U USERS, --USERS USERS
                        List of usernames to try for brute forcing. Not yet
                        implimented
  -P PASSWORDS, --PASSWORDS PASSWORDS
                        List of passwords to try. Optional for SSH, By default
                        wordlists/probable-v2-top1575.txt will be used.

Application snapshots

sshBrute - OG AUTO-RECON: An Nmap-based Scanner

OG AUTO-RECON: A Scanner based on Nmap was last modified: 22 June, 2020, 3: 29 mm by Anastasis Vasileiadis

Subscribe to our newsletter

no spam

spread the news

  • Facebook
  • Twitter
  • Reddit
  • Printing
  • Email

Read them Technology News from all over the world, with the validity of iGuRu.gr

Follow us on Google News


Competition: toolstag: Nmap

You May Also Like

Nmap 7.91 free Security Scanner for everyone
Nmap 7.90 free Security Scanner for everyone
scantron: nmap scanning framework

About Us Anastasis Vasileiadis

Translations are like women. When they are beautiful they are not faithful and when they are faithful they are not beautiful.

Previous Post: « CommandoVM: Windows-based security distribution for penetration testing
Next Post: CERN has approved a new 100 km long particle accelerator cern »

Reader Interactions

Comment Policy:

IGuRu.gr does not publish the comments immediately. Malicious comments, comments that include ads, or comments that are offensive are deleted without notice. We do not adopt the opinions expressed by our readers.
Your comments will be displayed after approval by the administrators


Leave your comment
Ακύρωση απάντησης

Your email address is not published. Τα υποχρεωτικά πεδία σημειώνονται με *

 

 © 2021 · iGuRu.gr · ☢ · Keep It Simple Stupid Genesis theme

about  ·   get in touch  ·  rss  ·  sitemap  ·  cough

loadingCancel
Could not post post - check your email address!
Email verification failed, please try again
Your blog can not post posts via email.