It was also developed with the aim of automating and facilitating the work of cybersecurity professionals.
Summary
reconDNS automates the entire process of reconnaisance for you. It outperforms the work of subdomain enumeration along with various vulnerability checks and obtaining maximum information about your target.
reconDNS uses lot of techniques (passive, bruteforce, permutations, certificate transparency, source code scraping, analytics, DNS records…) for subdomain enumeration which helps you getting the maximum and the most interesting subdomains so that you be ahead of the competition.
It also performs various vulnerability checks like XSS, Open Redirects, SSRF, CRLF, LFI, SQLi, SSL tests, SSTI, DNS zone transfers, and much more. Along with these, it performs OSINT techniques, directory fuzzing, dorking, ports scanning, screenshots, nuclei scan on your target.
It was also developed with the aim of automating and facilitating the work of cybersecurity professionals.
Tools of Contents
- Uro:
- gf:
- qsreplace:
- Amass:
- ffuf:
- github-subdomains:
- waybackurls:
- nuclei:
- anew:
- notify:
- unfurl:
- httpx:
- github-endpoints:
- dnsx:
- gau:
- subjs:
- Gxss:
- gospider:
- crlfuzz:
- dalfox:
- puredns:
- interactsh-client:
- analyticsrelationships:
- gotator:
- roboxtractor:
- mapcidr:
- ipcdn:
- dnstake:
- gowitness:
- cero:
- gitdorks_go:
So, what are you waiting for Go!
Installation
a) In your PC/VPS/VM
You can check out our wiki for the installation guide Installation Guide
- Requires Golang > 1.15.0+ installed and paths correctly set ($GOPATH, $GOROOT)
git clone https://github.com/blackcode666/recondns.git cd recondns/ chmod +x install.sh ./install.sh ./recondns.sh -d example.com -r
b) Docker Image (3 options)
- Pull the image
$ docker pull blackcode666/recondns:main
- Run the container
$ docker run -it --rm \ -v "${PWD}/OutputFolder/":'/recondns/Recon/' \ blackcode666/recondns:main -d example.com -r
However, if you wish to:
- Dynamically modify the behaviour & function of the image
- Build your own container
- Build an Axiom Controller on top of the official image
Please refer to the Docker documentation.
Config file:
A detailed explaintion of config file can be found here Configuration file
- Through
recondns.cfg
file the whole execution of the tool can be controlled. - Hunters can set various scanning modes, execution preferences, tools, config files, APIs/TOKENS, personalized wordlists and much more.
################################################################# # reconDNS config file # ################################################################# # General values tools=~/Tools SCRIPTPATH="$( cd "$(dirname "$0")" >/dev/null 2>&1 ; pwd -P )" profile_shell=".$(basename $(echo $SHELL))rc" recondns_version=$(git rev-parse --abbrev-ref HEAD)-$(git describe --tags) generate_resolvers=false proxy_url="http://127.0.0.1:8080/" #dir_output=/custom/output/path # Golang Vars (Comment or change on your own) export GOROOT=/usr/local/go export GOPATH=$HOME/go export PATH=$GOPATH/bin:$GOROOT/bin:$HOME/.local/bin:$PATH # Tools config files #NOTIFY_CONFIG=~/.config/notify/provider-config.yaml # No need to define AMASS_CONFIG=~/.config/amass/config.ini GITHUB_TOKENS=${tools}/.github_tokens #CUSTOM_CONFIG=custom_config_path.txt # In case you use a custom config file, uncomment this line and set your files path # APIs/TOKENS - Uncomment the lines you want removing the '#' at the beginning of the line #SHODAN_API_KEY="XXXXXXXXXXXXX" #WHOISXML_API="XXXXXXXXXX" #XSS_SERVER="XXXXXXXXXXXXXXXXX" #COLLAB_SERVER="XXXXXXXXXXXXXXXXX" #slack_channel="XXXXXXXX" #slack_auth="xoXX-XXX-XXX-XXX" # File descriptors DEBUG_STD="&>/dev/null" DEBUG_ERROR="2>/dev/null" # Osint OSINT=true GOOGLE_DORKS=true GITHUB_DORKS=true METADATA=true EMAILS=true DOMAIN_INFO=true IP_INFO=true METAFINDER_LIMIT=20 # Max 250 # Subdomains SUBDOMAINS_GENERAL=true SUBPASSIVE=true SUBCRT=true SUBANALYTICS=true SUBBRUTE=true SUBSCRAPING=true SUBPERMUTE=true SUBTAKEOVER=true SUBRECURSIVE=true SUB_RECURSIVE_PASSIVE=false # Uses a lot of API keys queries SUB_RECURSIVE_BRUTE=false # Needs big disk space and time to resolve ZONETRANSFER=true S3BUCKETS=true REVERSE_IP=false TLS_PORTS="21,22,25,80,110,135,143,261,271,324,443,448,465,563,614,631,636,664,684,695,832,853,854,990,993,989,990,992,993,994,995,1129,1131,1184,2083,2087,2089,2096,2221,2252,2376,2381,2478,2479,2482,2484,2679,2762,3077,3078,3183,3191,3220,3269,3306,3410,3424,3471,3496,3509,3529,3539,3535,3660,36611,3713,3747,3766,3864,3885,3995,3896,4031,4036,4062,4064,4081,4083,4116,4335,4336,4536,4590,4740,4843,4843,4849,5443,5007,5061,5321,5349,5671,5783,5868,5986,5989,5990,6209,6251,6443,6513,6514,6619,6697,6771,6697,7202,7443,7673,7674,7677,7775,8243,8443,8991,8989,9089,9295,9318,9443,9444,9614,9802,10161,10162,11751,12013,12109,14143,15002,16995,41230,16993,20003" # Web detection WEBPROBESIMPLE=true WEBPROBEFULL=true WEBSCREENSHOT=true VIRTUALHOSTS=true UNCOMMON_PORTS_WEB="81,300,591,593,832,981,1010,1311,1099,2082,2095,2096,2480,3000,3128,3333,4243,4567,4711,4712,4993,5000,5104,5108,5280,5281,5601,5800,6543,7000,7001,7396,7474,8000,8001,8008,8014,8042,8060,8069,8080,8081,8083,8088,8090,8091,8095,8118,8123,8172,8181,8222,8243,8280,8281,8333,8337,8443,8500,8834,8880,8888,8983,9000,9001,9043,9060,9080,9090,9091,9092,9200,9443,9502,9800,9981,10000,10250,11371,12443,15672,16080,17778,18091,18092,20720,32000,55440,55672" # You can change to aquatone if gowitness fails, comment the one you don't want AXIOM_SCREENSHOT_MODULE=webscreenshot # Choose between aquatone,gowitness,webscreenshot # Host FAVICON=true PORTSCANNER=true PORTSCAN_PASSIVE=true PORTSCAN_ACTIVE=true CLOUD_IP=true # Web analysis WAF_DETECTION=true NUCLEICHECK=true NUCLEI_SEVERITY="info,low,medium,high,critical" URL_CHECK=true URL_GF=true URL_EXT=true JSCHECKS=true FUZZ=true CMS_SCANNER=true WORDLIST=true ROBOTSWORDLIST=true PASSWORD_DICT=true PASSWORD_MIN_LENGTH=5 PASSWORD_MAX_LENGTH=14 # Vulns VULNS_GENERAL=false XSS=true CORS=true TEST_SSL=true OPEN_REDIRECT=true SSRF_CHECKS=true CRLF_CHECKS=true LFI=true SSTI=true SQLI=true BROKENLINKS=true SPRAY=true COMM_INJ=true PROTO_POLLUTION=true # Extra features NOTIFICATION=false # Notification for every function SOFT_NOTIFICATION=false # Only for start/end DEEP=false DEEP_LIMIT=500 DEEP_LIMIT2=1500 DIFF=false REMOVETMP=false REMOVELOG=false PROXY=false SENDZIPNOTIFY=false PRESERVE=true # set to true to avoid deleting the .called_fn files on really large scans FFUF_FLAGS="-mc all -fc 404 -ac -sf -s" # HTTP options HEADER="User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:72.0) Gecko/20100101 Firefox/72.0" # Threads FFUF_THREADS=40 HTTPX_THREADS=50 HTTPX_UNCOMMONPORTS_THREADS=100 GOSPIDER_THREADS=20 BRUTESPRAY_THREADS=20 BRUTESPRAY_CONCURRENCE=10 GAUPLUS_THREADS=10 DNSTAKE_THREADS=100 DALFOX_THREADS=200 PUREDNS_PUBLIC_LIMIT=0 # Set between 2000 - 10000 if your router blows up, 0 is unlimited PUREDNS_TRUSTED_LIMIT=400 PUREDNS_WILDCARDTEST_LIMIT=30 PUREDNS_WILDCARDBATCH_LIMIT=1500000 WEBSCREENSHOT_THREADS=200 GOWITNESS_THREADS=8 RESOLVE_DOMAINS_THREADS=150 PPFUZZ_THREADS=30 DNSVALIDATOR_THREADS=200 INTERLACE_THREADS=10 CERO_THREADS=1000 # Timeouts CMSSCAN_TIMEOUT=3600 FFUF_MAXTIME=900 # Seconds HTTPX_TIMEOUT=10 # Seconds HTTPX_UNCOMMONPORTS_TIMEOUT=10 # Seconds # lists fuzz_wordlist=${tools}/fuzz_wordlist.txt lfi_wordlist=${tools}/lfi_wordlist.txt ssti_wordlist=${tools}/ssti_wordlist.txt subs_wordlist=${tools}/subdomains.txt subs_wordlist_big=${tools}/subdomains_big.txt resolvers=${tools}/resolvers.txt resolvers_trusted=${tools}/resolvers_trusted.txt # Axiom Fleet # Will not start a new fleet if one exist w/ same name and size (or larger) # AXIOM=false Uncomment only to overwrite command line flags AXIOM_FLEET_LAUNCH=false AXIOM_FLEET_NAME="recondns" AXIOM_FLEET_COUNT=5 AXIOM_FLEET_REGIONS="eu-central" AXIOM_FLEET_SHUTDOWN=true # This is a script on your recondns host that might prep things your way... #AXIOM_POST_START="~/Tools/axiom_config.sh" AXIOM_EXTRA_ARGS="" # Leave empty if you don't want to add extra arguments #AXIOM_EXTRA_ARGS="--rm-logs" # Example # BBRF BBRF_CONNECTION=false BBRF_SERVER=https://demo.bbrf.me/bbrf BBRF_USERNAME="user" BBRF_PASSWORD="password" # TERM COLORS bred='\033[1;31m' bblue='\033[1;34m' bgreen='\033[1;32m' byellow='\033[1;33m' red='\033[0;31m' blue='\033[0;34m' green='\033[0;32m' yellow='\033[0;33m' reset='\033[0m'
Usage:
Check out the wiki section to know which flag performs what all steps/attacks Usage Guide
TARGET OPTIONS
Flag | Description |
---|---|
-d | Single Target domain (example.com) |
-l | List of targets (one per line) |
-m | Multiple domain target (companyName) |
-x | Exclude subdomains list (Out Of Scope) |
-i | Include subdomains list (In Scope) |
MODE OPTIONS
Flag | Description |
---|---|
-r | Recon – Full recon process (without attacks like sqli,ssrf,xss,ssti,lfi etc.) |
-s | Subdomains – Perform only subdomain enumeration, web probing, subdomain takeovers |
-p | Passive – Perform only passive steps |
-a | All – Perform whole recon and all active attacks |
-w | Web – Perform only vulnerability checks/attacks on particular target |
-n | OSINT – Performs an OSINT scan (no subdomain enumeration and attacks) |
-c | Custom – Launches specific function against target |
-h | Help – Show this help menu |
GENERAL OPTIONS
Flag | Description |
---|---|
–deep | Deep scan (Enable some slow options for deeper scan, vps intended mode) |
-f | Custom config file path |
-o | Output directory |
-v | Axiom distributed VPS |
Example Usage:
To perform a full recon on single target
./recondns.sh -d example.com -r
To perform a full recon on a list of targets
./recondns.sh -l sites.txt -r -o /output/directory/
Perform full recon with more time intense tasks (VPS intended only)
./recondns.sh -d example.com -r --deep -o /output/directory/
Perform recon in a multi domain target
./recondns.sh -m company -l domains_list.txt -r
Perform recon with axiom integration
./recondns.sh -d example.com -r -v
Perform all steps (whole recon + all attacks) a.k.a. YOLO mode
./recondns.sh -d example.com -a
Show help section
./recondns.sh -h
Axiom Support
Check out the wiki section for more info Axiom Support
- As recondns actively hits the target with a lot of web traffic, hence there was a need to move to Axiom distributing the work load among various instances leading to reduction of execution time.
- During the configuration of axiom you need to select
recondns
as provisoner. - You can create your own axiom’s fleet before running recondns or let recondns to create and destroy it automatically just modifying recondns.cfg file.
BBRF Support:
- To add recondns results to your BBRF instance just add IP and credentials on recondns.cfg file section dedicated to bbrf.
- During the execution of the scans the results will be added dinamically when each step ends.
- Even you can set up locally your BBRF instance to be able to visualize your results in a fancy web UI.
Sample video:
Features
Osint
- Domain information parser (domainbigdata)
- Emails addresses and users (theHarvester, emailfinder)
- Password leaks (pwndb and H8mail)
- Metadata finder (MetaFinder)
- Google Dorks (degoogle_hunter)
- Github Dorks (gitdorks_go)
Subdomains
- Passive (amass, waybackurls, github-subdomains, gau)
- Certificate transparency (ctfr)
- Bruteforce (puredns)
- Permutations (Gotator)
- JS files & Source Code Scraping (gospider)
- DNS Records (dnsx)
- Google Analytics ID (AnalyticsRelationships)
- Recursive search.
- Subdomains takeover (nuclei)
- DNS takeover (dnstake)
- DNS Zone Transfer (dig)
Hosts
- IP and subdomains WAF checker (cf-check and wafw00f)
- Port Scanner (Active with nmap and passive with nrich)
- Port services vulnerability checks (searchsploit)
- Password spraying (brutespray)
- Cloud providers check (clouddetect)
Webs
- Web Prober (httpx and unimap)
- Web screenshot (webscreenshot or gowitness)
- Web templates scanner (nuclei and nuclei geeknik)
- Url extraction (waybackurls, gauplus, gospider, github-endpoints and JSA)
- URLPatterns Search (gf and gf-patterns)
- XSS (dalfox)
- Open redirect (Oralyzer)
- SSRF (headers interactsh and param values with ffuf)
- CRLF (crlfuzz)
- Favicon Real IP (fav-up)
- Javascript analysis (subjs, JSA, LinkFinder, getjswords)
- Fuzzing (ffuf)
- Cors (Corsy)
- LFI Checks (ffuf)
- SQLi Check (SQLMap)
- SSTI (ffuf)
- CMS Scanner (CMSeeK)
- SSL tests (testssl)
- Broken Links Checker (gospider)
- S3 bucket finder (S3Scanner)
- Prototype Pollution (ppfuzz)
- URL sorting by extension
- Wordlist generation
- Passwords dictionary creation (pydictor)
Extras
- Multithread (Interlace)
- Custom resolvers generated list (dnsvalidator)
- Docker container included and DockerHub integration
- Allows IP/CIDR as target
- Resume the scan from last performed step
- Custom output folder option
- All in one installer/updater script compatible with most distros
- Diff support for continuous running (cron mode)
- Support for targets with multiple domains
- Raspberry Pi/ARM support
- 6 modes (recon, passive, subdomains, web, osint and all)
- Out of Scope Support
- Notification system with Slack, Discord and Telegram (notify) and sending zipped results support
Mindmap/Workflow
Data Keep
Follow these simple steps to end up having a private repository with your API Keys
and /Recon
data.
- Create a private blank repository on
Git(Hub|Lab)
(Take into account size limits regarding Recon data upload) - Clone your project:
git clone https://gitlab.com/example/recondns-data
- Get inside the cloned repository:
cd recondns-data
- Create branch with an empty commit:
git commit --allow-empty -m "Empty commit"
- Add official repo as a new remote:
git remote add upstream https://github.com/blackcode666/recondns
(upstream
is an example) - Update upstream’s repo:
git fetch upstream
- Rebase current branch with the official one:
git rebase upstream/main master
Main commands:
- Upload changes to your personal repo:
git add . && git commit -m "Data upload" && git push origin master
- Update tool anytime:
git fetch upstream && git rebase upstream/main master
How to contribute:
If you want to contribute to this project you can do it in multiple ways:
- Submitting an issue because you have found a bug or you have any suggestion or request.
- Making a Pull Request from dev branch because you want to improve the code or add something to the script.
Need help
Disclaimer
Usage of this program for attacking targets without consent is illegal. It is the user’s responsibility to obey all applicable laws. The developer assumes no liability and is not responsible for any misuse or damage caused by this program. Please use responsibly.
The material contained in this repository is licensed under GNU GPLv3.
The reconDNS is a github repository by Omar Passos
Leave a Reply