Ausnahme gefangen: SSL certificate problem: certificate is not yet valid ๐Ÿ“Œ O.G. AUTO-RECON - Enumerate A Target Based Off Of Nmap Results

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š O.G. AUTO-RECON - Enumerate A Target Based Off Of Nmap Results


๐Ÿ’ก Newskategorie: IT Security Nachrichten
๐Ÿ”— Quelle: feedproxy.google.com


Enumerate a target Based off of Nmap Results

Features
  • The purpose of O.G. Auto-Recon is to automate the initial information gathering phase and then enumerate based off those results as much as possible.
  • This tool is intended for CTF's and can be fairly noisy. (Not the most stealth conscious tool...)
  • All tools in this project are compliant with the OSCP exam rules.
  • Command syntax can be easily modified in the Config settings. $variable names should remain unchanged.
  • If Virtual Host Routing is detected, O.G. Auto-Recon will add the host names to your /etc/hosts file and continue to enumerate the newly discovered host names.
  • DNS enumeration is nerfed to ignore .com .co .eu .uk domains etc... since this tool was designed for CTF's like for instance, "hack the box". It will try to find most .htb domains if dns server's are detected..
  • This project use's various stand-alone & custom tools to enumerate a target based off nmap results.
  • All Commands and output are logged to a Report folder using the naming context, "IP-ADDRESS-Report/" which will look something like, 10.10.10.10-Report/ with a directory tree structure similar to this report tree structure

INSTALLATION
cd /opt
git clone https://github.com/Knowledge-Wisdom-Understanding/recon.git
cd recon
chmod +x setup.sh
./setup.sh

Usage
         _____________          ____    ________________        /___/___      \        /  / |  /___/__          \      Mr.P-Millz   _____        O.G./  /   _   \______/__/  |______|__|_____ *   \_________________/__/  |___         __/__/   /_\   \ |  |  \   __\/  _ \|  |       __/ __ \_/ ___\/  _ \|       |        |   |     ___    \|  |  /|  | (  |_| )  |    |   \  ___/\  \__(  |_| )   |   |        |___|____/\__\____|____/_|__|\_\____/|__|____|_  /\___  |\___  \____/|___|  /        gtihub.com/Knowledge-Wisdom-Understanding  \___\/  \__\/  \__\_/ v3.6 \___\/      usage: python3 recon.py -t 10.10.10.10    An Information Gathering and Enumeration Framework    optional arguments:    -h, --help            show this help message and exit    -t TARGET, --target TARGET                          Single IPv4 Target to Scan    -F, --FUZZ            auto fuzz found urls ending with .php for params    -v, --version         Show Current Version    -f FILE, --file FILE  File of IPv4 Targets to Scan    -w [WEB], --web [WEB]                          Get open ports for IPv4 address, then only Enumerate                          Web & and Dns Services. -t,--target must be specified.                          -w, --web takes a URL as an argument. i.e. python3                          recon.py -t 10.10.10.10 -w secret    -i {http,httpcms,ssl,sslcms,aquatone,smb,dns,ldap,removecolor,oracle,source,sort_urls,proxy,proxycms,fulltcp,topports,remaining,searchsploit,peaceout,ftpAnonDL,winrm} [{http,httpcms,ssl,sslcms,aquatone,smb,dns,ldap,removecolor,oracle,source,sort_urls,proxy,proxycms,fulltcp,topports,remaining,searchsploit,peaceout,ftpAnonDL,winrm} ...], --ignore {http,httpcms,ssl,sslcms,aquatone,smb,dns,ldap,removecolor,oracle,source,sort_urls,proxy,proxycms,fulltcp,topports,remaining,searchsploit,peaceout,ftpAnonDL,winrm} [{http,httpcms,ssl,sslcms,aquatone,smb,dns,ldap,removecolor,oracle,source,sort_urls,proxy,proxycms,fulltcp,topports,remaining,searchsploit,peaceout,ftpAnonDL,winrm} ...]                          Service modules to ignore during scan.    -s {http,httpcms,ssl,sslcms,aquatone,smb,dns,ldap,removecolor,oracle,source,sort_urls,proxy,proxycms,fulltcp,topports,remaining,searchsploit,peaceout,ftpAnonDL,winrm} [{http,httpcms,ssl,sslcms,aquatone,smb,dns,ldap,removecolor,oracle,source,sort_urls,proxy,proxycms,fulltcp,topports,remaining,searchsploit,peaceout,ftpAnonDL,winrm} ...], --service {http,httpcms,ssl,sslcms,aquatone,smb,dns,ldap,removecolor,oracle,source,sort_urls,proxy,proxycms,fulltcp,topports,remaining,searchsploit,peaceout,ftpAnonDL,winrm} [{http,httpcms,ssl,sslcms,aquatone,smb,dns,ldap,removecolor,oracle,source,sort_urls,proxy,proxycms,fulltcp,topports,remaining,searchsploit,peaceout,ftpAnonDL,winrm} ...]                          Scan only specified service modules    -b {ftp,smb,http,ssh}, --brute {ftp,smb,http,ssh}                          Experimental! - Brute Force ssh,smb,ftp, or http. -t,                          --target is REQUIRED. Must supply only one protocol at                          a time. For ssh, first valid users will be enumerated                          before password brute is initiated, when no user or                          passwords are supplied as options.    -p PORT, --port PORT  port for brute forcing argument. If no port specified,                          default port will be used    -u USER, --user USER  Single user name for brute forcing, for SSH, if no                          user specified, will default to                          wordlists/usernames.txt and bruteforce usernames    -U USERS, --USERS USERS                          List of usernames to try for brute forcing. Not yet                          implimented    -P PASSWORDS, --PASSWORDS PASSWORDS                          List of passwords to try. Optional for SSH, By default                          wordlists/probable-v2-top1575.txt will be used.    
To scan a single target and enumerate based off of nmap results:

_____________ ____ ________________
/___/___ \ / / | /___/__ \ Mr.P-Millz _____
O.G./ / _ \______/__/ |______|__|_____ * \_________________/__/ |___
__/__/ /_\ \ | | \ __\/ _ \| | __/ __ \_/ ___\/ _ \| |
| | ___ \| | /| | ( |_| ) | | \ ___/\ \__( |_| ) | |
|___|____/\__\____|____/_|__|\_\____/|__|____|_ /\___ |\___ \____/|___| /
gtihub.com/Knowledge-Wisdom-Understanding \___\/ \__\/ \__\_/ v3.6 \___\/


usage: python3 recon.py -t 10.10.10.10

An Information Gathering and Enumeration Framework

optional arguments:
-h, --help show this help message and exit
-t TARGET, --target TARGET
Single IPv4 Target to Scan
-F, --FUZZ auto fuzz found urls ending with .php for params
-v, --version Sh ow Current Version
-f FILE, --file FILE File of IPv4 Targets to Scan
-w [WEB], --web [WEB]
Get open ports for IPv4 address, then only Enumerate
Web & and Dns Services. -t,--target must be specified.
-w, --web takes a URL as an argument. i.e. python3
recon.py -t 10.10.10.10 -w secret
-i {http,httpcms,ssl,sslcms,aquatone,smb,dns,ldap,removecolor,oracle,source,sort_urls,proxy,proxycms,fulltcp,topports,remaining,searchsploit,peaceout,ftpAnonDL,winrm} [{http,httpcms,ssl,sslcms,aquatone,smb,dns,ldap,removecolor,oracle,source,sort_urls,proxy,proxycms,fulltcp,topports,remaining,searchsploit,peaceout,ftpAnonDL,winrm} ...], --ignore {http,httpcms,ssl,sslcms,aquatone,smb,dns,ldap,removecolor,oracle,source,sort_urls,proxy,proxycms,fulltcp,topports,remaining,searchsploit,peaceout,ftpAnonDL,winrm} [{http,httpcms,ssl,sslcms,aquatone,smb,dns,ldap,removecolor,oracle, source,sort_urls,proxy,proxycms,fulltcp,topports,remaining,searchsploit,peaceout,ftpAnonDL,winrm} ...]
Service modules to ignore during scan.
-s {http,httpcms,ssl,sslcms,aquatone,smb,dns,ldap,removecolor,oracle,source,sort_urls,proxy,proxycms,fulltcp,topports,remaining,searchsploit,peaceout,ftpAnonDL,winrm} [{http,httpcms,ssl,sslcms,aquatone,smb,dns,ldap,removecolor,oracle,source,sort_urls,proxy,proxycms,fulltcp,topports,remaining,searchsploit,peaceout,ftpAnonDL,winrm} ...], --service {http,httpcms,ssl,sslcms,aquatone,smb,dns,ldap,removecolor,oracle,source,sort_urls,proxy,proxycms,fulltcp,topports,remaining,searchsploit,peaceout,ftpAnonDL,winrm} [{http,httpcms,ssl,sslcms,aquatone,smb,dns,ldap,removecolor,oracle,source,sort_urls,proxy,proxycms,fulltcp,topports,remaining,searchsploit,peaceout,ftpAnonDL,winrm} ...]
Scan only specified service modules
-b {ftp,smb,http,ssh}, --brute {ftp,smb,http,ssh}
Experimental! - Brute Force ssh,smb,ftp, or http. -t,
--target is REQUIRED. Must supply only one protocol at
a time. For ssh, first valid users will be enumerated
before password brute is initiated, when no user or
passwords are supplied as options.
-p PORT, --port PORT port for brute forcing argument. If no port specified,
default port will be used
-u USER, --user USER Single user name for brute forcing, for SSH, if no
user specified, will default to
wordlists/usernames.txt and bruteforce usernames
-U USERS, --USERS USERS
List of usernames to try for brute forcing. Not yet
implimented
-P PASSWORDS, --PASSWORDS PASSWORDS
List of passwords to try. Optional for SSH, By defaul t
wordlists/probable-v2-top1575.txt will be used.
To Enumerate Web with larger wordlists
  • If you don't want to specify a directory , you can just enter ' ' as the argument for --web
python3 recon.py -t 10.10.10.10
Typically, on your first run, you should only specify the -t --target option (python3 recon.py -t 10.10.10.10) Before you can use the -s --service option to specify specific modules, you must have already ran the topports module. For instance, if you really wanted to skip all other modules on your first run, and only scan the web after topports, you could do something like,
python3 recon.py -t 10.10.10.10 -w secret
python3 recon.py -t 10.10.10.10 -w somedirectory
python3 recon.py -t 10.10.10.10 -w ' '
Or skip web enumeration all together but scan everything else.
python3 recon.py -t 10.10.10.10 -s topports dns http httpcms ssl sslcms sort_urls aquatone source
The remaining services module is also dependent on the topports and or fulltcp module. Now you can skip doing a fulltcp scan if the target is slow. However, be advised, The UDP nmap scan is bundled with the fulltcp module currently, so skipping fulltcp module will result in missing some udp enumeration.
To Scan + Enumerate all IPv4 addr's in ips.txt file
python3 recon.py -t 10.10.10.10 -i dns http httpcms ssl sslcms sort_urls aquatone source
To Fuzz all found php urls for parameters, you can use the -F --FUZZ flag with no argument.
python3 recon.py -f ips.txt
Brute force ssh users on default port 22 If unique valid users found, brute force passwords
python3 recon.py -t 10.10.10.10 --FUZZ
Same as above but for ssh on port 2222 etc...
python3 recon.py -t 10.10.10.10 -b ssh
To ignore certain services from being scanned you can specify the -i , --ignore flag.
When specifying multiple services to ignore, services MUST be space delimited. Only ignore topports if you have already ran this module as most other modules are dependent on nmap's initial top ports output. All the available modules are as follows:
http,httpcms,ssl,sslcms,aquatone,smb,dns,ldap,oracle,source,sort_urls,proxy,proxycms,fulltcp,topports,remaining,searchsploit,peaceout,ftpAnonDL,winrm  
python3 recon.py -t 10.10.10.10 -b ssh -p 2222
python3 recon.py -t 10.10.10.10 -b ssh -p 2222 -u slickrick
You can also specify services that you wish to only scan, similar to the --ignore option, the -s, --service option will only scan the service specified. Please note that before you can use the -s, --service option, You must have already ran the topports nmap scan as most modules are dependent on nmap's output.
http,httpcms,ssl,sslcms,aquatone,smb,dns,ldap,oracle,source,sort_urls,proxy,proxycms,fulltcp,topports,remaining,searchsploit,peaceout,ftpAnonDL,winrm
python3 recon.py -t 10.10.10.10 -i http
python3 recon.py -t 10.10.10.10 -i http ssl
python3 recon.py --target 10.10.10.10 --ignore fulltcp http

Important
  • MAKE SURE TO CHECK OUT THE Config file for all your customization needs Enumerate a target Based off of Nmap Results (3)
  • All required non-default kali linux dependencies are included in setup.sh.

Demo
This program is intended to be used in kali linux. If you notice a bug or have a feature request. Please create an issue or submit a pull request. Thanks!


...



๐Ÿ“Œ GPT_Vuln-analyzer - Uses ChatGPT API And Python-Nmap Module To Use The GPT3 Model To Create Vulnerability Reports Based On Nmap Scan Data


๐Ÿ“ˆ 35.4 Punkte

๐Ÿ“Œ NMAP Announces release of nPcap 1.30, Raw Wifi + Better Performance. https://seclists.org/nmap-announce/2021/1, (Tue, Apr 13th)


๐Ÿ“ˆ 30.25 Punkte

๐Ÿ“Œ NMAP without NMAP - Port Testing and Scanning with PowerShell, (Mon, Oct 31st)


๐Ÿ“ˆ 30.25 Punkte

๐Ÿ“Œ Nmap Bootstrap XSL - A Nmap XSL Implementation With Bootstrap


๐Ÿ“ˆ 30.25 Punkte

๐Ÿ“Œ DivideAndScan - Divide Full Port Scan Results And Use It For Targeted Nmap Runs


๐Ÿ“ˆ 25.9 Punkte

๐Ÿ“Œ Raspberry / Windows get different NMAP results


๐Ÿ“ˆ 25.9 Punkte

๐Ÿ“Œ Deals: $200 off new MacBook Pro, $100 off iPad Air, $120 off M2 Mac mini, $40 off Blue Yeti mic


๐Ÿ“ˆ 25.11 Punkte

๐Ÿ“Œ Scanning & Exploiting a target using (Nmap & Metasploit )


๐Ÿ“ˆ 24.13 Punkte

๐Ÿ“Œ Scanning & Exploiting a target using (Nmap & Metasploit )


๐Ÿ“ˆ 24.13 Punkte

๐Ÿ“Œ Pwn2Own Vancouver 2019: Day Schedule Results and Live Results


๐Ÿ“ˆ 21.56 Punkte

๐Ÿ“Œ A tail of fuzzing oleaut32.dll that leads to results - just not the expected results


๐Ÿ“ˆ 21.56 Punkte

๐Ÿ“Œ Ubuntu User Survey Results Published, Show Some Surprising Results


๐Ÿ“ˆ 21.56 Punkte

๐Ÿ“Œ How to filter Reddit & Quora results from Google Search Results


๐Ÿ“ˆ 21.56 Punkte

๐Ÿ“Œ Best early Target Black Friday deals 2022: $80 off AirPods Pro, $50 off Echo


๐Ÿ“ˆ 21.56 Punkte

๐Ÿ“Œ Hackers Can Target CT, MRI Scanners & Manipulate Scan Results


๐Ÿ“ˆ 19.78 Punkte

๐Ÿ“Œ Digital sales growth helps propel Target, Kohl's to strong Q4 results


๐Ÿ“ˆ 19.78 Punkte

๐Ÿ“Œ Liberapay: Private target account appears in search results


๐Ÿ“ˆ 19.78 Punkte

๐Ÿ“Œ China-Based Hackers Target Southeast Asia With USB-Based Malware


๐Ÿ“ˆ 19.3 Punkte

๐Ÿ“Œ Daily deals Dec. 1: $600 off Samsung 49-inch monitor, $5 off HomePod mini, 91% off Microsoft Office for Mac, more


๐Ÿ“ˆ 18.83 Punkte

๐Ÿ“Œ Deals: AirPods 38% Off, Apple Watch 8 $50 Off, iPad Air $100 Off


๐Ÿ“ˆ 18.83 Punkte

๐Ÿ“Œ Deals: $50 Off AirPods Pro, $250 Off 15โ€ณ M2 MacBook Air, $150 Off Beats Studio Pro, & More


๐Ÿ“ˆ 18.83 Punkte

๐Ÿ“Œ Daily deals Dec. 8: $50 off Apple Watch Ultra, $100 off iPad Air 5, 42% off Roomba J7, more


๐Ÿ“ˆ 18.83 Punkte

๐Ÿ“Œ Daily deals Dec. 12: $150 off M2 MacBook Air, Up to 31% off Blue microphones, up to $300 off storage, more


๐Ÿ“ˆ 18.83 Punkte

๐Ÿ“Œ Daily Deals Dec. 15: $150 off Mac mini, 52% off Samsung Galaxy Smartwatch 4, 42% off AirTag Keychain Holders & more


๐Ÿ“ˆ 18.83 Punkte

๐Ÿ“Œ Daily deals Dec. 18: $100 off AirPods Max, $50 off AirPods Pro Gen 2, $300 off 14-inch MacBook Pro, more


๐Ÿ“ˆ 18.83 Punkte

๐Ÿ“Œ Daily Deals Dec. 21: $400 off MacBook Pro, 48% off Philips Hue bulbs, 32% off Samsung Galaxy Watch 4 & more


๐Ÿ“ˆ 18.83 Punkte

๐Ÿ“Œ Daily Deals Jan. 1: $150 off M2 MacBook Air, $150 off Studio Display, 37% off TurboTax Home & Business, more


๐Ÿ“ˆ 18.83 Punkte

๐Ÿ“Œ Daily deals Jan. 7: $550 off 14-inch MacBook Pro, $50 off Apple Watch Ultra, $200 off Samsung M8 monitor, more


๐Ÿ“ˆ 18.83 Punkte

๐Ÿ“Œ Daily deals Jan. 8: $50 off Apple Watch Series 8, 31% off Roborock Q5+ Robot Vacuum, $200 off 75-inch LG 4K Smart TV, more


๐Ÿ“ˆ 18.83 Punkte

๐Ÿ“Œ Daily Deals Jan. 13: $410 off MacBook Pro, 44% off Apple Smart Keyboard, 20% off Xbox Series S & more


๐Ÿ“ˆ 18.83 Punkte











matomo