⚔️
Carpa Security Book
  • 😎Introduction
  • 🔴Offensive Security
    • Reconnaissance & Information Gathering
      • Passive Reconnaissance
        • Reconnaissance Frameworks
        • Metadata Analysis
        • Domain & IP Enumeration
        • Social Media
        • Email Addresses
        • Search Engines
      • Active Recon
        • System & Network
          • Network & Port Scanning
          • Vulnerability Scanners
          • OS Fingerprinting & Service Identification
          • Network Mapping and Visualization
          • Service Enumeration
        • Web Application
          • Public Resource
          • Technology Mapping
          • Analyzing Client Side Code
          • Testing User Inputs and Controls:
          • Analyzing Server Responses and Error Messages:
          • API and Endpoint Analysis:
          • Session Management Analysis
          • Automated Vulnerability Scanning
          • Web Enumeration
        • Wireless Network Reconnaissance
    • Exploitation & Target Compromise
    • Privilege Escalation
    • Post Exploitation
      • Lateral Movement
    • Attacktive Directory
    • Credential Attacks
    • Wireless
    • Social Engineering
    • Web App PenTesting
    • Physical Security
  • 🔵Defensive Security
  • 🖥️Linux Commands
  • 🔠Certificates Prep
  • 🔗Training and Resources
Powered by GitBook
On this page
  • Recon-NG
  • Maltego
  • SpiderFoot
  • theHarvester
  • Shodan
  1. Offensive Security
  2. Reconnaissance & Information Gathering
  3. Passive Reconnaissance

Reconnaissance Frameworks

PreviousPassive ReconnaissanceNextMetadata Analysis

Last updated 1 year ago

Reconnaissance frameworks are specialized tools used in cybersecurity to systematically gather information about a target system, network, or organization without direct interaction. They are integral to the preparatory phase of penetration testing, also known as the information gathering phase. These frameworks automate the collection of public data that can help identify potential vulnerabilities and understand the security posture of a target.

Recon-NG

Recon-NG

Recon-ng is a full-featured Web Reconnaissance framework written in Python. It has a similar interface to Metasploit, making it intuitive to those familiar with the Metasploit framework. Recon-ng is modular and has a variety of modules that can perform a multitude of reconnaissance tasks. It’s great for gathering data from open-source resources and integrates with various third-party services and APIs.

Key Features:

  • Extensive module library for different reconnaissance tasks.

  • Interactive shell for running and chaining modules.

  • Ability to export findings in various formats.

Resources:

  • to Recon-NG.

  • Check out the playlist below for a deep dive (it's free)

Maltego

Maltego

Maltego is an interactive data mining tool that renders directed graphs for link analysis. It's an incredibly powerful tool for exploring relationships and networks between information and entities on the internet, such as people, companies, organizations, websites, domains, network infrastructure, and social network connections.

Key Features:

  • Visual link analysis and interactive graphs.

  • Integration with a wide range of data sources.

  • Transformations for automating the mining and display of information.

Resource:

SpiderFoot

SpiderFoot

SpiderFoot is an open-source intelligence automation tool (OSINT). It automates the process of gathering intelligence on a given target, whether that target is a domain name, hostname, IP address, or network subnet. SpiderFoot can query over 100 different public data sources and is available both as a web-based service and as a standalone scriptable Python-based software.

Key Features:

  • Extensive data source integration for thorough reconnaissance.

  • Automation of OSINT collection on multiple targets.

  • Results can be exported in various formats and visualized graphically.

Resources:

theHarvester

theHarvester

Description: theHarvester is a tool designed for open source intelligence (OSINT) and reconnaissance, particularly useful for early stages of a penetration test. It's designed to gather information about emails, subdomains, hosts, employee names, open ports, and banners from different public sources like search engines and PGP key databases.

Key Features:

  • Simple command-line interface.

  • Quick enumeration of emails, subdomains, and hosts.

  • Supports various search engines and sources for data collection.

Resources:

  • To gather emails and subdomains from a particular domain, you might use theHarvester -d targetdomain.com -b google.

Shodan

Shodan

Shodan is not a framework but a search engine that lets the user find specific types of computers connected to the internet using a variety of filters. Although it’s a standalone service, it’s often used within reconnaissance frameworks or in the reconnaissance phase to find devices, servers, and even IoT devices that are publicly accessible on the internet.

Key Features:

  • Finds devices connected to the internet.

  • Can filter by device type, country, port, operating system, and more.

  • Offers powerful API integration for custom tools and scripts.

Resources:

🔴
Maltego Main Site
Maltego | Kali Linux Tools
How to Use Maltego: A Beginner’s Guide to OSINT Analysis
SpiderFoot – A Automate OSINT Framework in Kali Linux
SpiderFoot GitHub
GitHub Repo
FootPrinting/Reconnaissance using tools the harvester
OSINT analysis — SpiderFoot & theharvester (Information Gathering)
Main site
What Is Shodan? How to Use It & How to Stay Protected [2024]
GitHub Link
Recon-ng: An Open Source Reconnaissance Tool
Recon-NG Tutorial