Reconnaissance tool
Project description
Table of Contents
HackRecon
Project URL : https://github.com/EmilienPer/HackRecon
HackRecon was created to be used for OSCP certification. This tool (inspired by the "reconnoitre" tool: https://github.com/codingo/Reconnoitre) makes it possible to scan hosts finally to obtain a maximum of information on these. It is therefore a recognition tool. Its mechanism can be summarized as follows:
For each host:
- Create the exploit, proof and scan folders required for OSCP certification
- Determine open ports and related services
- For each port:
- List exploits related to the product using the port
- Start scans according to the protocol
- Suggest additional scans asking for human intervention or other exploits
- Write an analysis report (HTML and XML format)
Requirement
HackRecon run on Python 2.7 can't work correctly without the following tools
- Nmap
- smtp-user-enum
- whatweb
- nikto
- dirb
Installation
sudo pip install hackrecon
Options
Shortcut | option | Required | Default | Description |
---|---|---|---|---|
X | The Ip(s) address of the host | |||
-o | --output | . | The output directory | |
-t | --max_threads | 5 | The maximum number of host handled in the same time | |
--cache | False | Use cache | ||
-a | --all | False | Scan all ports | |
--css | The CSS file to use into the HTML report | |||
--javascript_header | The javascript file to use into the header of the HTML report | |||
--javascript_tail | The javascript file to use into the end of the HTML report | |||
--full | Use all nmap nse scrip for the protocol. The value can be "all" or a list of protocol separated by ";" |
Usage
The param can be
- An IPv4 address (example: 192.168.0.1)
- An range of IPv4 addresses (example: 192.168.0.0/24 or 192.168.0.1-254)
- A list of IPv4 address separated by ";" (example: 192.168.0.1;198.162.0.2)
Example:
hackrecon 192.168.0.1 -o /root/
,hackrecon 192.168.0.0/24 -o /root/
hackrecon 192.168.0.1-254 -o /root/
hackrecon 192.168.0.1;198.162.0.2 -o /root/
hackrecon 192.168.0.1 -o /root/ -t 5 --cache --all
hackrecon 192.168.0.1 -o /root/ --javascript_header javascript_file.js --javascript_tail other_file.js --css shett.css
hackrecon 192.168.0.1 -o /root/ -t 5 --cache --all --full all
hackrecon 192.168.0.1 -o /root/ -t 5 --cache --all --full http;ssh;smb
Example
Example of usage can be found in the "examples" directory
Issues management
For contributions or suggestions, please open an Issue and clearly explain, using an example or a use case if appropriate.
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file hackrecon-1.7.tar.gz
.
File metadata
- Download URL: hackrecon-1.7.tar.gz
- Upload date:
- Size: 13.0 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/1.12.1 pkginfo/1.5.0.1 requests/2.21.0 setuptools/39.0.1 requests-toolbelt/0.9.1 tqdm/4.30.0 CPython/2.7.15
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 3e2ff99d2d0b26a74fc8e8105bf3f0ea702762da4b579d6fdfdfe4f3a7f06d83 |
|
MD5 | 7096af8f050a8628ea0da52f2f6a016b |
|
BLAKE2b-256 | 74de9764659626de3f46d30f9e920c677a4eb9097a827a6d5ed2d76a63d7761d |
File details
Details for the file hackrecon-1.7-py2-none-any.whl
.
File metadata
- Download URL: hackrecon-1.7-py2-none-any.whl
- Upload date:
- Size: 25.7 kB
- Tags: Python 2
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/1.12.1 pkginfo/1.5.0.1 requests/2.21.0 setuptools/39.0.1 requests-toolbelt/0.9.1 tqdm/4.30.0 CPython/2.7.15
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 765756b0c128b81739406605de9c3cd395c221457cf1e916812102fd7cc395f3 |
|
MD5 | 24fa80eedb331d2fcf278b53c3038414 |
|
BLAKE2b-256 | cb5a6246ed96d709751d4ada305ca2e685c8265d1a4635453e0e370796230524 |