This repository was archived by the owner on Nov 11, 2020. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 68
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
bd84000
commit 2a1e5fb
Showing
3 changed files
with
210 additions
and
41 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,59 +1,71 @@ | ||
|
||
|
||
|
||
# AutoRecon | ||
   | ||
|
||
   | ||
|
||
## Features | ||
|
||
- Enum subdomains, create permutation & wildcard removing with [Amass](https://github.com/OWASP/Amass/) | ||
- Search subdomains on github with [Github-Subdomains](https://github.com/gwen001/github-search/blob/master/github-subdomains.py) | ||
- Find web services and screenshots with[Aquatone](https://github.com/michenriksen/aquatone) | ||
- [Nuclei](https://github.com/projectdiscovery/nuclei) : Configurable targeted scanning based on templates | ||
- [Gau](https://github.com/lc/gau) : Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl for any given domain. | ||
- [Hakrawler](https://github.com/hakluke/hakrawler) : Simple, fast web crawler | ||
- [ParamSpider](https://github.com/devanshbatham/ParamSpider) : Mining parameters from dark corners of Web Archives | ||
- [Gf](https://github.com/tomnomnom/gf) : A wrapper around grep, to help you grep for things | ||
- With somes GF profiles from [Gf-Patterns](https://github.com/1ndianl33t/Gf-Patterns) and [ParamSpider](https://github.com/devanshbatham/ParamSpider/tree/master/gf_profiles) | ||
- [SubDomainizer](https://github.com/nsonaniya2010/SubDomainizer) : Designed to find hidden subdomains and secrets present is either webpage, Github, and external javascripts present in the given URL. | ||
|
||
How I use this tool for BugBounty : [My subdomains enumeration process](https://www.jomar.fr/posts/2020/03/en-my-subdomains-enumeration-process/) | ||
|
||
 | ||
 | ||
|
||
## Installation | ||
- Installation & Recon tested on Debian 10 | ||
- Installation & Recon tested on Ubuntu 20.04 | ||
|
||
Run installer : | ||
```bash | ||
./install.sh | ||
``` | ||
|
||
If wanted (recommended), configure [Amass](https://github.com/OWASP/Amass/) with the desired API keys by creating a [config.ini](https://github.com/OWASP/Amass/blob/master/examples/config.ini) file. | ||
|
||
## Usage | ||
Create the file `.tokens` in `/root/Tools/Github-Subdomains/` with one or more github token. | ||
|
||
## Usage | ||
```bash | ||
./recon.sh -d domain.tld -c ~/Tools/Amass/config.ini | ||
./recon.sh -d domain.tld -r -s -c /root/Tools/Amass/config.ini | ||
``` | ||
|
||
Options : | ||
```bash | ||
-d | --domain (required) : Launch passive scan (Amass & DnsGen) | ||
-c | --amassconfig (optional) : Provide Amass configuration files for better results | ||
-d | --domain (required) : Domain in domain.tld format | ||
-r | --recon (optional) : Search subdomains for the specified domain | ||
-s | --scan (optional) : Scan the specified domain | ||
-c | --amassconfig (optional) : Provide Amass configuration files for better results | ||
-rp | --resultspath (optional) : Defines the output folder | ||
``` | ||
|
||
 | ||
 | ||
|
||
## Domain monitoring | ||
The advantage of using amass with the "-dir" option is that it also allows monitoring with a bash script. | ||
|
||
For example, you can create a cron task that executes the following content at regular intervals: | ||
|
||
```bash | ||
#!/bin/bash | ||
|
||
DOMAIN=your-domain.tld | ||
|
||
/root/AutoRecon.sh -d $DOMAIN -c /root/Tools/Amass/config.ini | ||
|
||
MSG=$(amass track -d $DOMAIN -dir /root/Recon/$DOMAIN/Amass/ | grep 'Found:') | ||
|
||
PAYLOAD="payload={\"text\": \"$MSG\"}" | ||
HOOK=https://hooks.slack.com/services/XXXX/XXXX/XXXX | ||
|
||
if [ ! -z "$var" ] | ||
then | ||
curl -X POST --data-urlencode "$PAYLOAD" "$HOOK" | ||
curl -X POST --data-urlencode "$PAYLOAD" "$HOOK" | ||
fi | ||
``` | ||
|
||
 | ||
 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters