Skip to main content
Join the official 2019 Python Developers SurveyStart the survey!

Reconnaissance tool

Project description

PyPi License Documentation Status Known Vulnerabilities Donate Beerpay

Table of Contents

HackRecon

Project URL : https://github.com/EmilienPer/HackRecon

HackRecon was created to be used for OSCP certification. This tool (inspired by the "reconnoitre" tool: https://github.com/codingo/Reconnoitre) makes it possible to scan hosts finally to obtain a maximum of information on these. It is therefore a recognition tool. Its mechanism can be summarized as follows:

For each host:

  • Create the exploit, proof and scan folders required for OSCP certification
  • Determine open ports and related services
  • For each port:
    • List exploits related to the product using the port
    • Start scans according to the protocol
    • Suggest additional scans asking for human intervention or other exploits
  • Write an analysis report (HTML and XML format)

Requirement

HackRecon run on Python 2.7 can't work correctly without the following tools

  • Nmap
  • smtp-user-enum
  • whatweb
  • nikto
  • dirb

Installation

sudo pip install hackrecon

Options

Shortcut option Required Default Description
<ips> X The Ip(s) address of the host
-o --output . The output directory
-t --max_threads 5 The maximum number of host handled in the same time
--cache False Use cache
-a --all False Scan all ports
--css The CSS file to use into the HTML report
--javascript_header The javascript file to use into the header of the HTML report
--javascript_tail The javascript file to use into the end of the HTML report
--full Use all nmap nse scrip for the protocol. The value can be "all" or a list of protocol separated by ";"

Usage

The <ips> param can be

  • An IPv4 address (example: 192.168.0.1)
  • An range of IPv4 addresses (example: 192.168.0.0/24 or 192.168.0.1-254)
  • A list of IPv4 address separated by ";" (example: 192.168.0.1;198.162.0.2)

Example:

  • hackrecon 192.168.0.1 -o /root/,
  • hackrecon 192.168.0.0/24 -o /root/
  • hackrecon 192.168.0.1-254 -o /root/
  • hackrecon 192.168.0.1;198.162.0.2 -o /root/
  • hackrecon 192.168.0.1 -o /root/ -t 5 --cache --all
  • hackrecon 192.168.0.1 -o /root/ --javascript_header javascript_file.js --javascript_tail other_file.js --css shett.css
  • hackrecon 192.168.0.1 -o /root/ -t 5 --cache --all --full all
  • hackrecon 192.168.0.1 -o /root/ -t 5 --cache --all --full http;ssh;smb

Example

Example of usage can be found in the "examples" directory

Issues management

For contributions or suggestions, please open an Issue and clearly explain, using an example or a use case if appropriate.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Files for hackrecon, version 1.7
Filename, size File type Python version Upload date Hashes
Filename, size hackrecon-1.7-py2-none-any.whl (25.7 kB) File type Wheel Python version py2 Upload date Hashes View hashes
Filename, size hackrecon-1.7.tar.gz (13.0 kB) File type Source Python version None Upload date Hashes View hashes

Supported by

Elastic Elastic Search Pingdom Pingdom Monitoring Google Google BigQuery Sentry Sentry Error logging AWS AWS Cloud computing DataDog DataDog Monitoring Fastly Fastly CDN SignalFx SignalFx Supporter DigiCert DigiCert EV certificate StatusPage StatusPage Status page