This tutorial will go through some ways of obtaining info on a target with Recon-NG tool available in ArchStrike.
First, let's download Recon-NG (obviously you don't need to do this if you have it already installed)
# pacman -S recon-ng-git
Let's start it up.
# recon-ng
Now you should see a menu similar to this:
[75] Recon modules
[7] Reporting modules
[2] Import modules
[2] Exploitation modules
[2] Discovery modules
[recon-ng][default] >
Now let's get some help.
[recon-ng][default] > help
Commands (type [help|?] <topic>):
---------------------------------
add Adds records to the database
back Exits the current context
delete Deletes records from the database
exit Exits the framework
help Displays this menu
keys Manages framework API keys
load Loads specified module
pdb Starts a Python Debugger session
query Queries the database
record Records commands to a resource file
reload Reloads all modules
resource Executes commands from a resource file
search Searches available modules
set Sets module options
shell Executes shell commands
show Shows various framework items
snapshots Manages workspace snapshots
spool Spools output to a file
unset Unsets module options
use Loads specified module
workspaces Manages workspaces
Let's see what modules he have.
[recon-ng][default] > show
Shows various framework items
Usage: show [banner|companies|contacts|credentials|dashboard|domains|hosts|keys|leaks|locations|modules|netblocks|options|ports|profiles|pushpins|repositories|schema|vulnerabilities|workspaces]
[recon-ng][default] > show modules
Discovery
---------
discovery/info_disclosure/cache_snoop
discovery/info_disclosure/interesting_files
There is a lot more but if I were to put it all this would get very long. Instead you can inspect the output on your terminal better.
recon/hosts-hosts/ssltools
recon/domains-hosts/hackertarget
These modules looks interesting, let's see what they do.
[recon-ng][default] > use recon/hosts-hosts/ssltools
[recon-ng][default][ssltools] > show options
Name Current Value Required Description
-------- ------------- -------- -----------
RESTRICT True yes restrict added hosts to current domains
SOURCE default yes source of input (see 'show info' for details)
When you want to learn more about a module, you can use:
[recon-ng][default][ssltools] > show info
As you see, we need to set our source to our target. I'll use google.com
in my example.
[recon-ng][default][ssltools] > set source google.com
SOURCE => google.com
Now I do this to kick off the module:
[recon-ng][default][ssltools] > run
Pretty easy. Now it will give me output regarding my target. You can try and experiment on your own.
Let's see the other module.
[recon-ng][default][ssltools] > back
[recon-ng][default] > use recon/domains-hosts/hackertarget
[recon-ng][default][hackertarget] > show options
Name Current Value Required Description
------ ------------- -------- -----------
SOURCE default yes source of input (see 'show info' for details)
Let's set our source again and run the module.
[recon-ng][default][hackertarget] > set source archstrike.org
SOURCE => archstrike.org
[recon-ng][default][hackertarget] > run
--------------
ARCHSTRIKE.ORG
--------------
[*] [host] archstrike.org (45.79.6.151)
[*] [host] mirror.archstrike.org (50.116.42.150)
-------
SUMMARY
-------
[*] 2 total (2 new) hosts found.
Feel free to explore all the modules Recon-NG has to offer, but be responsible in your actions.
Disclaimer: Packages in ArchStrike are licensed by their upstream author and under no case ArchStrike or the script author can be held responsible for your actions.