A reconnaissance tool made for the OSCP engagements to automate information gathering and service enumeration whilst creating a directory structure to store results, findings and exploits used for each host, recommended commands to execute and directory structures for storing loot and flags. Also document the information in CherryTree so you can focus on the exploitation instead of reconnaissance.
Install package and you will have /usr/bin/massrecon.py ready for usage.
sudo pip3 install -r requirements.txt
sudo python3 setup.py install
./massrecon.py
███╗ ███╗ █████╗ ███████╗███████╗██████╗ ███████╗ ██████╗ ██████╗ ███╗ ██╗
████╗ ████║██╔══██╗██╔════╝██╔════╝██╔══██╗██╔════╝██╔════╝██╔═══██╗████╗ ██║
██╔████╔██║███████║███████╗███████╗██████╔╝█████╗ ██║ ██║ ██║██╔██╗ ██║
██║╚██╔╝██║██╔══██║╚════██║╚════██║██╔══██╗██╔══╝ ██║ ██║ ██║██║╚██╗██║
██║ ╚═╝ ██║██║ ██║███████║███████║██║ ██║███████╗╚██████╗╚██████╔╝██║ ╚████║
╚═╝ ╚═╝╚═╝ ╚═╝╚══════╝╚══════╝╚═╝ ╚═╝╚══════╝ ╚═════╝ ╚═════╝ ╚═╝ ╚═══╝
[Scans and updates CherryTree]
Usage: massrecon [OPTIONS]
General Options
recon <ip> Start recon target
[Plugins]
nmap <ip> Run nmap module only
dirb <ip> Run dirb module only
nikto <ip> Run nikto module only
ftp <ip> Run ftp module only
sslyze <ip> Run sslyze module only
quickscan <ip> Run quick portscan on all ports.
$ ./massrecon.py recon 10.10.10.88
==========================================================================================
NMAP_STAGE_1: 10.10.10.88
==========================================================================================
✔ 80/tcp open
------------------------------------------------------------------------------------------
⠹ NMAP STAGE[2]
==========================================================================================
NMAP_STAGE_2: 10.10.10.88
==========================================================================================
Starting Nmap 7.70 ( https://nmap.org ) at 2018-05-20 15:58 CEST
Nmap scan report for 10.10.10.88
Host is up (0.059s latency).
PORT STATE SERVICE VERSION
80/tcp open http Apache httpd 2.4.18 ((Ubuntu))
|_http-title: Landing Page
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 15.09 seconds
------------------------------------------------------------------------------------------
✔ http://10.10.10.88/robots.txt
➜ Spider: http://10.10.10.88/webservices/tar/tar/source/
➜ Spider: http://10.10.10.88/webservices/monstra-3.0.4/
For view in Cherrytree. Database file can be found in this location.
~/.massrecon/massrecon.ctd