RECONSPIDER:
Most Advanced Tools scanning IP Addresses,
Emails, Websites, Organizations and find out
information from different sources. ReconSpider
is used by Infosec Researchers, Penetration
Testers, Bug Hunters and Cyber Crime
investigators to find deep information about their
target. This tool can be installed by cloning with
GitHub. It requires python python3-pip.
Installation process is as follows:
Step 1: cloning with GitHub.
git clone https://github.com/bhavsec/reconspider.git
Step 2: install python and python3-pip.
sudo apt install python3 python3-pip
Step 3: install all dependencies
cd reconspider
sudo python3 setup.py install
Step 4: setting up database.
https://lite.ip2location.com/database/px8-ip-proxytype-country-region-city-isp-domain-
usagetype-asn-lastseen
Download database, extract it and move to reconspider/plugins/ directory.
The tool has various options to fetch many information like IP address, domain name, phone
number and many other information as well. The options are as follows:
1. IP
This option gathers all the information of given IP address from public resources.
ReconSpider >> 1
IP >> 8.8.8.8
2. DOMAIN
This option gathers all the information of given URL address and check for
vulnerability.
Reconspider >> 2
HOST (URL / IP) >> vulnweb.com
PORT >> 443
3. PHONENUMBER
This option allows the user to gather information about the given phone number.
Reconspider >> 3
PHONE NUMBER (919485247632) >>
4. DNS MAP
This option allows the user to map an organisations attack surface with a virtual DNS
Map of the DNS records associated with the target organization.
ReconSpider >> 4
DNS MAP (URL) >> vulnweb.com
5. METADATA
This option allows the user to extract the metadata of the file
Reconspider >> 5
Metadata (PATH) >> /root/Downloads/images.jpeg
6. REVERSE IMAGE SEARCH
This option allows to user to obtain information and similar images that are available
in the internet.
Reconspider >> 6
REVERSE IMAGE SEARCH (PATH) >> /root/Downloads/images.jpeg
Open Search Result in web browser? (Y/N) : y
7. HONEYPOT
This option allows the user to identify honeypots! The probability that an IP is a
honeypot is captured in a "Honeyscore" value that can range from 0.0 to 1.0
ReconSpider >> 7
HONEYPOT (IP) >> 1.1.1.1
8. MAC ADDRESS LOOKUP
This option allows you to identify Mac address details who is manufacturer, address,
country, etc.
Reconspider >> 8
MAC ADDRESS LOOKUP (Eg:08:00:69:02:01:FC) >>
9. IPHEATMAP
This option provided you heatmap of the provided ip or single ip, if connect all the
provided IP location with accurate Coordinator.
Reconspider >> 9
1) Trace single IP
2) Trace multiple IPs
OPTIONS >>
10. TORRENT
This option allows you to gathers history of Torrent download history.
Reconspider >> 10
IPADDRESS (Eg:192.168.1.1) >>
11. USERNAME
This option allows you to gathers account information of the provided username from
social media like Instagram, Twitter, Facebook.
Reconspider >> 11
1.Facebook
2.Twitter
3.Instagram
Username >>
12. IP2PROXY
This option allows you to identify whether IP address uses any kind of VPN / Proxy
to hide his identify.
Reconspider >> 12
IPADDRESS (Eg:192.168.1.1) >>
13. MAIL BREACH
This option allows you to identify all breached mail ID from given domain
Reconspider >> 13
DOMAIN (Eg:intercom.io) >>
99. UPDATE:
This option allows you to check for updates. If a newer version will available,
ReconSpider will download and merge the updates into the current directory without
overwriting other files.
ReconSpider >> 99
Checking for updates..
0. EXIT
This option allows you to exit from ReconSpider Framework to your current
Operating System's terminal.
ReconSpider >> 0
Bye, see ya again.
These are the various options available in the tool Reconspider.
GHOST-EYE
Ghost-eye is an information gathering,
Footprinting, Scanner, and Recon tool
which is developed using python 3. It
is easy to use and gathers various
information like port scan, IP location
finding, traceroute, etc. Installing this tool is same as that of the ReconSpider.
Firstly, cloning with GitHub.
git clone https://github.com/BullsEye0/ghost_eye.git
Next, make sure to install python and python3-pip done in installing the ReconSpider tool. Further,
install al the dependencies required. And then run these commands to finish the setup.
pip3 install -r requirements.txt
cd ghost eye
python3 setup.py install
Ghost Eye gathers information data such as:
EtherApe – Graphical Network Monitor (root)
DNS Lookup
Whois Lookup
Nmap Port Scan
HTTP Header Grabber
Clickjacking Test - X-Frame-Options Header
Robots.txt Scanner
Cloudflare Cookie scraper
Link Grabber
IP Location Finder
Detecting CMS with Identified Technologies
Traceroute
Crawler target URL + Robots.txt
Certificate Transparency log monitor
HAWKSCAN
Hawkscan is one of the easiest tools used for
reconnaissance. Using this we can gather various
information which includes DNS server information,
organisation name, address, city, zip, country, email
address related to the respective organisation,
registrars, naming servers, DNS information, Website
Information, E-mail Address Checker, Phone Number
Information, Credit Card Bin Checker, Ip Locator, Port Scanner, whois, bing, censys.io, dns, github,
dnsdumpster, instagram, crt, ask, dogpile.
We can install hawkscan tool by running the following commands.
Firstly, clone with github.
git clone https://github.com/c0dejump/HawkScan.git
Next, install the python requirements by running
pip3 install -r requirements.txt
Now, give the permission of execution to the tool by running
chmod +x setup.py hawkscan.py config.py
Finally, we can run the tool using the command
python3 hawkscan.py -h
In this way, Hawkscan tool can be installed and used further.
PHONEINFOGA
Phoneinfoga is one of the reconnaissance tools used to
gather information related to the international phone
numbers. It gathers the basic information such as
country, area, line, and carrier on any international
phone numbers with very greater accuracy.
By using this tool, we can
check if the phone number that you have searched, exists or not.
gather information about phone numbers such as country, area, carrier, and line type.
OSINT footprints using external APIs, Google Hacking, search engine, and phone books.
Check for reputation reports, social media, disposable numbers, and more.
Scan several numbers at once.
Run web instances as a service.
But the limitations are
It does not allow to hack a phone.
It does not allow to get the precise phone location.
It does not allow to track phone or its owner in real time.
We can use this tool by visiting the website https://demo.phoneinfoga.crvx.fr/#/
In this way, we can use the phoneinfoga tool to gather various information.
References:
https://www.geeksforgeeks.org/reconspider-most-advanced-open-source-intelligence-osint-framework/
https://www.google.com/search?q=reconspider&rlz=1C1YTUH_enIN1019IN1019&sxsrf=AJOqlzXGZWr8GVnFF2PPh8YNj-
29u_OptQ:1674742523401&source=lnms&tbm=isch&sa=X&ved=2ahUKEwj38MmJtuX8AhWJzqACHZ9kD4AQ_AUoAnoECAIQBA
&biw=1422&bih=720&dpr=1.35#imgrc=TebGCAq8z3FPIM
https://github.com/BullsEye0/ghost_eye
https://www.geeksforgeeks.org/hawkscan-reconnaissance-and-information-gathering-tool-in-kali-linux/
https://hakin9.org/phoneinfoga-advanced-information-gathering-osint-framework-for-phone-numbers/