0% found this document useful (0 votes)
224 views6 pages

Active Recon

ReconSpider, Ghost-Eye, HawkScan, and PhoneInfoga are open source intelligence and reconnaissance tools that can gather various information from public sources. ReconSpider uses Python and can gather IP, domain, phone, and other metadata. Ghost-Eye also uses Python and gathers information like port scanning and IP/DNS lookups. HawkScan performs reconnaissance to find organization and email information. PhoneInfoga specifically focuses on gathering country, area, carrier from international phone numbers. All tools can be installed via GitHub and have both command line and web interfaces.

Uploaded by

Rakshith U
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
224 views6 pages

Active Recon

ReconSpider, Ghost-Eye, HawkScan, and PhoneInfoga are open source intelligence and reconnaissance tools that can gather various information from public sources. ReconSpider uses Python and can gather IP, domain, phone, and other metadata. Ghost-Eye also uses Python and gathers information like port scanning and IP/DNS lookups. HawkScan performs reconnaissance to find organization and email information. PhoneInfoga specifically focuses on gathering country, area, carrier from international phone numbers. All tools can be installed via GitHub and have both command line and web interfaces.

Uploaded by

Rakshith U
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

RECONSPIDER:

Most Advanced Tools scanning IP Addresses,


Emails, Websites, Organizations and find out
information from different sources. ReconSpider
is used by Infosec Researchers, Penetration
Testers, Bug Hunters and Cyber Crime
investigators to find deep information about their
target. This tool can be installed by cloning with
GitHub. It requires python python3-pip.

Installation process is as follows:


Step 1: cloning with GitHub.
git clone https://github.com/bhavsec/reconspider.git
Step 2: install python and python3-pip.
sudo apt install python3 python3-pip
Step 3: install all dependencies
cd reconspider

sudo python3 setup.py install

Step 4: setting up database.


https://lite.ip2location.com/database/px8-ip-proxytype-country-region-city-isp-domain-
usagetype-asn-lastseen
Download database, extract it and move to reconspider/plugins/ directory.
The tool has various options to fetch many information like IP address, domain name, phone
number and many other information as well. The options are as follows:
1. IP
This option gathers all the information of given IP address from public resources.
ReconSpider >> 1
IP >> 8.8.8.8

2. DOMAIN
This option gathers all the information of given URL address and check for
vulnerability.
Reconspider >> 2
HOST (URL / IP) >> vulnweb.com
PORT >> 443

3. PHONENUMBER
This option allows the user to gather information about the given phone number.
Reconspider >> 3
PHONE NUMBER (919485247632) >>
4. DNS MAP
This option allows the user to map an organisations attack surface with a virtual DNS
Map of the DNS records associated with the target organization.
ReconSpider >> 4
DNS MAP (URL) >> vulnweb.com

5. METADATA
This option allows the user to extract the metadata of the file
Reconspider >> 5
Metadata (PATH) >> /root/Downloads/images.jpeg

6. REVERSE IMAGE SEARCH


This option allows to user to obtain information and similar images that are available
in the internet.
Reconspider >> 6
REVERSE IMAGE SEARCH (PATH) >> /root/Downloads/images.jpeg
Open Search Result in web browser? (Y/N) : y

7. HONEYPOT
This option allows the user to identify honeypots! The probability that an IP is a
honeypot is captured in a "Honeyscore" value that can range from 0.0 to 1.0
ReconSpider >> 7
HONEYPOT (IP) >> 1.1.1.1

8. MAC ADDRESS LOOKUP


This option allows you to identify Mac address details who is manufacturer, address,
country, etc.
Reconspider >> 8
MAC ADDRESS LOOKUP (Eg:08:00:69:02:01:FC) >>

9. IPHEATMAP
This option provided you heatmap of the provided ip or single ip, if connect all the
provided IP location with accurate Coordinator.
Reconspider >> 9
1) Trace single IP
2) Trace multiple IPs
OPTIONS >>

10. TORRENT
This option allows you to gathers history of Torrent download history.
Reconspider >> 10
IPADDRESS (Eg:192.168.1.1) >>

11. USERNAME
This option allows you to gathers account information of the provided username from
social media like Instagram, Twitter, Facebook.
Reconspider >> 11

1.Facebook
2.Twitter
3.Instagram

Username >>

12. IP2PROXY
This option allows you to identify whether IP address uses any kind of VPN / Proxy
to hide his identify.
Reconspider >> 12
IPADDRESS (Eg:192.168.1.1) >>

13. MAIL BREACH


This option allows you to identify all breached mail ID from given domain
Reconspider >> 13
DOMAIN (Eg:intercom.io) >>

99. UPDATE:
This option allows you to check for updates. If a newer version will available,
ReconSpider will download and merge the updates into the current directory without
overwriting other files.
ReconSpider >> 99
Checking for updates..

0. EXIT
This option allows you to exit from ReconSpider Framework to your current
Operating System's terminal.
ReconSpider >> 0
Bye, see ya again.

These are the various options available in the tool Reconspider.

GHOST-EYE
Ghost-eye is an information gathering,
Footprinting, Scanner, and Recon tool
which is developed using python 3. It
is easy to use and gathers various
information like port scan, IP location
finding, traceroute, etc. Installing this tool is same as that of the ReconSpider.
Firstly, cloning with GitHub.

git clone https://github.com/BullsEye0/ghost_eye.git


Next, make sure to install python and python3-pip done in installing the ReconSpider tool. Further,
install al the dependencies required. And then run these commands to finish the setup.
pip3 install -r requirements.txt

cd ghost eye

python3 setup.py install

Ghost Eye gathers information data such as:

 EtherApe – Graphical Network Monitor (root)


 DNS Lookup
 Whois Lookup
 Nmap Port Scan
 HTTP Header Grabber
 Clickjacking Test - X-Frame-Options Header
 Robots.txt Scanner
 Cloudflare Cookie scraper
 Link Grabber
 IP Location Finder
 Detecting CMS with Identified Technologies
 Traceroute
 Crawler target URL + Robots.txt
 Certificate Transparency log monitor

HAWKSCAN
Hawkscan is one of the easiest tools used for
reconnaissance. Using this we can gather various
information which includes DNS server information,
organisation name, address, city, zip, country, email
address related to the respective organisation,
registrars, naming servers, DNS information, Website
Information, E-mail Address Checker, Phone Number
Information, Credit Card Bin Checker, Ip Locator, Port Scanner, whois, bing, censys.io, dns, github,
dnsdumpster, instagram, crt, ask, dogpile.

We can install hawkscan tool by running the following commands.

Firstly, clone with github.

git clone https://github.com/c0dejump/HawkScan.git

Next, install the python requirements by running

pip3 install -r requirements.txt

Now, give the permission of execution to the tool by running

chmod +x setup.py hawkscan.py config.py

Finally, we can run the tool using the command

python3 hawkscan.py -h

In this way, Hawkscan tool can be installed and used further.


PHONEINFOGA
Phoneinfoga is one of the reconnaissance tools used to
gather information related to the international phone
numbers. It gathers the basic information such as
country, area, line, and carrier on any international
phone numbers with very greater accuracy.

By using this tool, we can

 check if the phone number that you have searched, exists or not.
 gather information about phone numbers such as country, area, carrier, and line type.
 OSINT footprints using external APIs, Google Hacking, search engine, and phone books.
 Check for reputation reports, social media, disposable numbers, and more.
 Scan several numbers at once.
 Run web instances as a service.

But the limitations are

 It does not allow to hack a phone.


 It does not allow to get the precise phone location.
 It does not allow to track phone or its owner in real time.

We can use this tool by visiting the website https://demo.phoneinfoga.crvx.fr/#/

In this way, we can use the phoneinfoga tool to gather various information.
References:
 https://www.geeksforgeeks.org/reconspider-most-advanced-open-source-intelligence-osint-framework/
 https://www.google.com/search?q=reconspider&rlz=1C1YTUH_enIN1019IN1019&sxsrf=AJOqlzXGZWr8GVnFF2PPh8YNj-
29u_OptQ:1674742523401&source=lnms&tbm=isch&sa=X&ved=2ahUKEwj38MmJtuX8AhWJzqACHZ9kD4AQ_AUoAnoECAIQBA
&biw=1422&bih=720&dpr=1.35#imgrc=TebGCAq8z3FPIM
 https://github.com/BullsEye0/ghost_eye
 https://www.geeksforgeeks.org/hawkscan-reconnaissance-and-information-gathering-tool-in-kali-linux/
 https://hakin9.org/phoneinfoga-advanced-information-gathering-osint-framework-for-phone-numbers/

You might also like