Skip to main content

Reconnaissance tool

Project description

PyPi License Documentation Status Known Vulnerabilities Donate Beerpay

Table of Contents

HackRecon

Project URL : https://github.com/EmilienPer/HackRecon

HackRecon was created to be used for OSCP certification. This tool (inspired by the "reconnoitre" tool: https://github.com/codingo/Reconnoitre) makes it possible to scan hosts finally to obtain a maximum of information on these. It is therefore a recognition tool. Its mechanism can be summarized as follows:

For each host:

  • Create the exploit, proof and scan folders required for OSCP certification
  • Determine open ports and related services
  • For each port:
    • List exploits related to the product using the port
    • Start scans according to the protocol
    • Suggest additional scans asking for human intervention or other exploits
  • Write an analysis report (HTML and XML format)

Requirement

HackRecon run on Python 2.7 can't work correctly without the following tools

  • Nmap
  • smtp-user-enum
  • whatweb
  • nikto
  • dirb

Installation

sudo pip install hackrecon

Options

Shortcut option Required Default Description
X The Ip(s) address of the host
-o --output . The output directory
-t --max_threads 5 The maximum number of host handled in the same time
--cache False Use cache
-a --all False Scan all ports
--css The CSS file to use into the HTML report
--javascript_header The javascript file to use into the header of the HTML report
--javascript_tail The javascript file to use into the end of the HTML report
--full Use all nmap nse scrip for the protocol. The value can be "all" or a list of protocol separated by ";"

Usage

The param can be

  • An IPv4 address (example: 192.168.0.1)
  • An range of IPv4 addresses (example: 192.168.0.0/24 or 192.168.0.1-254)
  • A list of IPv4 address separated by ";" (example: 192.168.0.1;198.162.0.2)

Example:

  • hackrecon 192.168.0.1 -o /root/,
  • hackrecon 192.168.0.0/24 -o /root/
  • hackrecon 192.168.0.1-254 -o /root/
  • hackrecon 192.168.0.1;198.162.0.2 -o /root/
  • hackrecon 192.168.0.1 -o /root/ -t 5 --cache --all
  • hackrecon 192.168.0.1 -o /root/ --javascript_header javascript_file.js --javascript_tail other_file.js --css shett.css
  • hackrecon 192.168.0.1 -o /root/ -t 5 --cache --all --full all
  • hackrecon 192.168.0.1 -o /root/ -t 5 --cache --all --full http;ssh;smb

Example

Example of usage can be found in the "examples" directory

Issues management

For contributions or suggestions, please open an Issue and clearly explain, using an example or a use case if appropriate.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

hackrecon-1.6.4.tar.gz (13.0 kB view hashes)

Uploaded Source

Built Distribution

hackrecon-1.6.4-py2-none-any.whl (25.6 kB view hashes)

Uploaded Python 2

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page