Home Pentesting - Information Gathering - Discovery Infraestructure
Post
Cancel

Pentesting - Information Gathering - Discovery Infraestructure

Information Gathering - Discovery Infraestructure

reconftw

Github: https://github.com/six2dez/reconftw

How to install it:

1
2
3
git clone https://github.com/six2dez/reconftw
cd reconftw/
./install.sh

Usage:

1
./reconftw.sh -d target.com -r -o /output/directory/

Reconftw is a versatile tool that assists cybersecurity professionals, red teamers, and ethical hackers in collecting valuable information during penetration testing and security assessments. Here are some examples of what Reconftw can do:

  1. Port Scanning: Reconftw can scan a target network to identify open ports and the services running on them. For example:
1
reconftw.py scan -t <IP>
  1. Subdomain Enumeration: The tool can search for and enumerate subdomains associated with a target domain. For example:
1
reconftw.py subdomains -d <IP>
  1. WHOIS Information Gathering: Reconftw can extract WHOIS information for a given domain, including ownership and contact details. For example:
1
reconftw.py whois -d <IP>
  1. Email Harvesting: The tool can search for email addresses on websites and public sources. For example:
1
reconftw.py email -d <IP>
  1. IP Address to Domain Mapping: Reconftw can identify domain names associated with IP addresses. For example:
1
reconftw.py ip2domain -i <IP>
  1. Technology and Version Detection: The tool can detect the technologies and versions used in services and applications. For example:
1
reconftw.py technologies -t <IP>
This post is licensed under CC BY 4.0 by the author.