Reconnaissance Swiss Army Knife – ReconDog
Introduction
ReconDog is a Information Gathering and Vulnerability Scanner tool written in Python. It’s an all in one tool for all basic information gathering tasks, such as:
- enumerating subdomains, port scanning, reverse IP lookup, NS lookup, detecting honeypot, detecting CMS, etc.
ReconDog: All In One Tool For Information Gathering
Recon Dog is program designed to perform all most common recon tasks. In other words, it’s a python script which you can use for your information gathering needs. It uses APIs for gathering, so no direct contact is made to the target and your identity wont be exsposed.
Features:
- Wizard + CLA interface
- Can extracts targets from STDIN (piped input) and act upon them
- All the information is extracted with APIs, no direct contact is made to the target
Utilities:
- Censys: Uses censys.io to gather massive amount of information about an IP address.
- NS Lookup: Does name server lookup
- Port Scan: Scan most common TCP ports
- Detect CMS: Can detect 400+ CMSs
- Whois lookup: Performs a whois lookup
- Detect honeypot: Uses shodan.io to check if target is a honeypot
- Find subdomains: Uses findsubdomains.com to find subdomains
- Reverse IP lookup: Does a reverse IP lookup to find domains associated with an IP address
- Detect technologies: Uses wappalyzer.com to detect 1000+ technologies
- All: Runs all utilities against the target
Supported platforms:
You can run ReconDog on anything that has a python interpreter installed. Tested on:
- OSs: Windows, Linux, Mac
- Python v:
python 2.7,
python 3.6
ReconDog Install
Clone it from the github repo:
$ git clone https://github.com/s0md3v/ReconDog.git
Then install the requirements (tld
, requests
):
$ pip install -r requirements.txt
And all you need to do is to simply run it, as a normal python script. There is no need for manual configuration.
$ ./dog
Mac Users:
- Install
python 2/3
with brew (brew depends on Apple’s xcoode). Withpython3
:
$ xcode-select --install $ /usr/bin/ruby -e "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/master/install)" $ brew install python3
- Install the requirements:
$ pip3 install -r requirements.txt
- Then run with the following:
$ python3 dog
Basic Usage
_____ ____ | __ |___ ___ ___ ___ |\_/| | \ ___ ___ | -| -_| _| . | | |. .| | | | . | . | |__|__|___|___|___|_|_| \_/ |____/|___|_ | |___| v2.0 1. Censys 2. NS lookup 3. Port scan 4. Detect CMS 5. Whois lookup 6. Detect honeypot 7. Find subdomains 8. Reverse IP lookup 9. Detect technologies 0. All >>
Wizard Interface
The easiest way to use ReconDog is trough WI. Run it, select what you want from the list and enter the target. That’s it.
CLA Interface
You can also use it trough CLI (Command Line Interface). Example:
$ python dog -t example.com -c 7
To enumerate subdomains and scan ports of all found subdomains, run the following:
$ subdomainfinder -t example.com | python dog --domains -c 3
If you just want to print the targets, leaves out -c
option.
Recon Dog uses regular expressions to find targets, so you can integrate it with every tool. There are two switches available:
--domains
: extract domains from STDIN--ips extract
: ip addresses from STDIN