Ausnahme gefangen: SSL certificate problem: certificate is not yet valid ๐Ÿ“Œ Rekono - Execute Full Pentesting Processes Combining Multiple Hacking Tools Automatically

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š Rekono - Execute Full Pentesting Processes Combining Multiple Hacking Tools Automatically


๐Ÿ’ก Newskategorie: IT Security Nachrichten
๐Ÿ”— Quelle: kitploit.com


Rekono combines other hacking tools and its results to execute complete pentesting processes against a target in an automated way. The findings obtained during the executions will be sent to the user via email or Telegram notifications and also can be imported in Defect-Dojo if an advanced vulnerability management is needed. Moreover, Rekono includes a Telegram bot that can be used to perform executions easily from anywhere and using any device.


Features

  • Combine hacking tools to create pentesting processes
  • Execute pentesting processes
  • Execute pentesting tools
  • Review findings and receive them via email or Telegram notifications
  • Use Defect-Dojo integration to import the findings detected by Rekono
  • Execute tools and processes from Telegram Bot
  • Wordlists management

Why Rekono?

Do you ever think about the steps that you follow when start a pentesting? Probably you start performing some OSINT tasks to gather public information about the target. Then, maybe you run hosts discovery and ports enumeration tools. When you know what the target exposes, you can execute more specific tools for each service, to get more information and maybe, some vulnerabilities. And finally, if you find the needed information, you will look for a public exploit to get you into the target machine. I know, I know, this is an utopic scenario, and in the most cases the vulnerabilities are found due to the pentester skills and not by scanning tools. But before using your skills, how many time do you spend trying to get as information as possible with hacking tools? Pro bably, too much.

Why not automate this process and focus on find vulnerabilities using your skills and the information that Rekono sends you?

The Rekono name comes from the Esperanto language where it means recon.

Supported tools

Thanks to all the contributors of these amazing tools!

Installation

Docker

Execute the following commands in the root directory of the project:

docker-compose build
docker-compose up -d

If you need more than one tool running at the same time, you can set the number of executions-worker instances:

docker-compose up -d --scale executions-worker=5

Go to https://127.0.0.1/

You can check the details in the Docker documentation. Specially, the initial user documentation

Using Rekono CLI

If your system is Linux, you can use rekono-cli to install Rekono in your system:

pip3 install rekono-cli
rekono install

After that, you can manage the Rekono services using the following commands:

rekono services start
rekono services stop
rekono services restart

Go to http://127.0.0.1:3000/

โš ๏ธ Only for Linux environments.

โš ๏ธ Docker is advised. Only use that for local and personal usage.

From Source

Check the installation from source in Rekono Wiki

Configuration

Check the configuration options in Rekono Wiki

License

Rekono is licensed under the GNU GENERAL PUBLIC LICENSE Version 3

Support

If you need help you can create a new support Issue or mail rekono.project@gmail.com



...



๐Ÿ“Œ Performance metrics from processes / top 10 processes of timeframe


๐Ÿ“ˆ 28.9 Punkte

๐Ÿ“Œ Pentesting vs. Bug Bounty vs. Pentesting ???


๐Ÿ“ˆ 28.49 Punkte

๐Ÿ“Œ Pentesting vs. Pentesting as a Service: Which is better?


๐Ÿ“ˆ 28.49 Punkte

๐Ÿ“Œ How to automatically kill processes that exceed a certain CPU %?


๐Ÿ“ˆ 26.3 Punkte

๐Ÿ“Œ Kali Linux 2017.2 Ethical Hacking & Pentesting OS Introduces New Security Tools


๐Ÿ“ˆ 26.29 Punkte

๐Ÿ“Œ Pentesting OS BlackArch Linux New Version 2019.06.01 Released with 2200 Hacking Tools


๐Ÿ“ˆ 26.29 Punkte

๐Ÿ“Œ Commando VM 2.0 โ€“ A New Version of Offensive Pentesting VM Updated With Kali Linux & New Hacking Tools


๐Ÿ“ˆ 26.29 Punkte

๐Ÿ“Œ GitHackTools: The best Hacking and PenTesting tools installer on the world


๐Ÿ“ˆ 26.29 Punkte

๐Ÿ“Œ Some-Tools - Install And Keep Up To Date Some Pentesting Tools


๐Ÿ“ˆ 26.09 Punkte

๐Ÿ“Œ Minimalistic-offensive-security-tools - A Repository Of Tools For Pentesting Of Restricted And Isolated Environments


๐Ÿ“ˆ 26.09 Punkte

๐Ÿ“Œ Improve Your Cyber Security Posture by Combining State of the Art Security Tools


๐Ÿ“ˆ 25.74 Punkte

๐Ÿ“Œ Critical Flaws in PGP and S/MIME Tools โ€“ Immediately disable tools that automatically decrypt PGP-encrypted email


๐Ÿ“ˆ 23.7 Punkte

๐Ÿ“Œ The scammers automatically created ios accounts with valid email accounts, then automatically used stolen cards to buy and resell stuff.


๐Ÿ“ˆ 23.69 Punkte

๐Ÿ“Œ Linux Series: Full Guide Managing Processes in Ubuntu


๐Ÿ“ˆ 22.5 Punkte

๐Ÿ“Œ AtomBombing; An Injection Code that Infects Multiple Processes in Windows


๐Ÿ“ˆ 20.43 Punkte

๐Ÿ“Œ AtomBombing; An Injection Code that Infects Multiple Processes in Windows


๐Ÿ“ˆ 20.43 Punkte

๐Ÿ“Œ mprocs 0.2.2 - TUI for running multiple processes in terminal


๐Ÿ“ˆ 20.43 Punkte

๐Ÿ“Œ Qt 5.8 Massive Release Lets You Create Devices with Multiple UI Processes, More


๐Ÿ“ˆ 20.43 Punkte

๐Ÿ“Œ Qt 5.8 Massive Release Lets You Create Devices with Multiple UI Processes, More


๐Ÿ“ˆ 20.43 Punkte

๐Ÿ“Œ Mozilla Launches Firefox 54, First Release to Use Multiple Content Processes


๐Ÿ“ˆ 20.43 Punkte

๐Ÿ“Œ Linux Mint Devs Work on Splitting Cinnamon into Multiple Processes, Improvements


๐Ÿ“ˆ 20.43 Punkte

๐Ÿ“Œ How to Fix Multiple Windows Explorer Processes


๐Ÿ“ˆ 20.43 Punkte

๐Ÿ“Œ Incident management tools and processes insufficient to enable innovation


๐Ÿ“ˆ 20.38 Punkte

๐Ÿ“Œ Defense in depth explained: Layering tools and processes for better security


๐Ÿ“ˆ 20.38 Punkte

๐Ÿ“Œ 5 Software Tools to Help You Improve Your Business Processes


๐Ÿ“ˆ 20.38 Punkte

๐Ÿ“Œ Platform engineering brings consistency to tools, processes under one umbrella


๐Ÿ“ˆ 20.38 Punkte

๐Ÿ“Œ How To Get Into Hacking / Pentesting


๐Ÿ“ˆ 20.37 Punkte

๐Ÿ“Œ How To Get Into Hacking / Pentesting


๐Ÿ“ˆ 20.37 Punkte

๐Ÿ“Œ What is your recommended pentesting / hacking distro for pendrive?


๐Ÿ“ˆ 20.37 Punkte

๐Ÿ“Œ Evil-Winrm - The Ultimate WinRM Shell For Hacking/Pentesting


๐Ÿ“ˆ 20.37 Punkte

๐Ÿ“Œ Evil-Winrm v1.9 - The Ultimate WinRM Shell For Hacking/Pentesting


๐Ÿ“ˆ 20.37 Punkte

๐Ÿ“Œ DEF CON 27 Packet Hacking Village - Tom Kopchak - Lessons Learned Running a Pentesting Competition


๐Ÿ“ˆ 20.37 Punkte

๐Ÿ“Œ In eigener Sache: Webinar zu Pentesting und Hacking - live und kostenlos


๐Ÿ“ˆ 20.37 Punkte

๐Ÿ“Œ In eigener Sache: Webinar zu Pentesting und Hacking - live und kostenlos - Golem.de


๐Ÿ“ˆ 20.37 Punkte











matomo