reconftw – Simple Script Full Recon Web Scanner Suite

reconftw - Full Recon Web Scanner Suite
reconftw – Full Recon Web Scanner Suite

reconftw – Simple Script For Full Recon

Summary

This is a simple script intended to perform a full recon on an objective with multiple subdomains.

ReconFTW automates the entire process of reconnaissance for you. It outperforms the work of subdomain enumeration along with various vulnerability checks and obtaining maximum information about your target.

ReconFTW uses a lot of techniques (passive, bruteforce, permutations, certificate transparency, source code scraping, analytics, DNS records…) for subdomain enumeration which helps you to get the maximum and the most interesting subdomains so that you be ahead of the competition.

It also performs various vulnerability checks like XSS, Open Redirects, SSRF, CRLF, LFI, SQLi, SSL tests, SSTI, DNS zone transfers, and much more. Along with these, it performs OSINT techniques, directory fuzzing, dorking, ports scanning, screenshots, nuclei scan on your target.

Features

  • Google Dorks (based on deggogle_hunter)
  • Subdomain enumeration (passive, resolution, bruteforce and permutations)
  • Sub TKO (subjack and nuclei)
  • Web Prober (httpx)
  • Web screenshot (aquatone)
  • Template scanner (nuclei)
  • Port Scanner (naabu)
  • Url extraction (waybackurls, gau, hakrawler, github-endpoints)
  • Pattern Search (gf and gf-patterns)
  • Param discovery (paramspider and arjun)
  • XSS (Gxss and dalfox)
  • Github Check (git-hound)
  • Favicon Real IP (fav-up)
  • JS Checks (LinkFinder, SecretFinder, scripts from JSFScan)
  • Fuzzing (ffuf)
  • Cors (Corsy)
  • SSL Check (testssl)
  • Interlace integration
  • Custom output folder (default under Recon/target.com/)
  • Run standalone steps (subdomains, subtko, web, gdorks…)
  • Polished installer compatible with most distros

Mindmap/Workflow

Reconftw Mindmap V2
Reconftw Mindmap V2

Requirements

  • Requires Go
  • Run ./install.sh before first run (apt, rpm, pacman compatible)
    git clone https://github.com/six2dez/reconftw
    cd reconftw
    chmod +x *.sh
    ./install.sh
    ./reconftw.sh -d target.com -a
Recontftw Commands
Recontftw Commands
  • Golang > 1.14 installed and env vars correctly set ($GOPATH,$GOROOT)
  • Run ./install.sh
    Installer is provided as is. Nobody knows your system better than you, so nobody can debug your system better than you. If you are experiencing some issues with the installer script I can help you out, but keep in mind that is not my main priority.
  • It is highly recommended, and in some cases essential, set your api keys:
    amass (~/.config/amass/config.ini)
    subfinder (~/.config/subfinder/config.yaml)
    git-hound (~/.githound/config.yml)
    github-endpoints.py (GITHUB_TOKEN env var)
    favup (shodan init SHODANPAIDAPIKEY)
  • This script uses dalfox with blind-xss option, you must change to your own server, check xsshunter.com.

Usage examples

Full scan:

./reconftw.sh -d target.com -a

Subdomains scan:

./reconftw.sh -d target.com -s

Web scan (target list required):

./reconftw.sh -d target.com -l targets.txt -w

Dorks:

./reconftw.sh -d target.com -g

Improvement plan:

  • Notification support (Slack, Discord and Telegram)
  • CMS tools (wpscan, drupwn/droopescan, joomscan)
  • Add menu option for every feature
  • Any other interesting suggestion
  • Open Redirect with Oralyzer
  • Enhance this Readme
  • Customize output folder
  • Interlace usage
  • Crawler
  • SubDomainizer
  • Install script
  • Apt, rpm, pacman compatible installer

Download Reconftw

Also See – RecoX: Scripts For Web Application Reconnaissance

Join Our Club

Enter your Email address to receive notifications | Join over Million Followers

Previous Article
Microsoft and Adobe Security Patch

January 2021 Patch Updates - Microsoft Zero Day And Adobe Critical Bugs

Next Article

How To Add Signature To A PDF

Related Posts
Total
0
Share