Archive | April, 2016

PowerShell Empire Download – Post-Exploitation Hacking Tool

Use Netsparker


PowerShell Empire is a post-exploitation hacking tool built on cryptographically secure communications and a flexible architecture. Empire implements the ability to run PowerShell agents without needing powershell.exe, rapidly deployable post-exploitation modules ranging from key loggers to Mimikatz, and adaptable communications to evade network detection, all wrapped up in a usability-focused framework.

PowerShell Empire Download - Post-Exploitation Hacking Tool


It has a LOT of modules (90+) and is currently in the midst of implementing a RESTful API which will be great.

PowerShell Empire Module Categories

Currently Empire Power Shell has the following categories for modules:

  • Code Execution – Ways to run more code
  • Collection – Post exploitation data collection
  • Credentials – Collect and use creds
  • Exfiltration – Identify egress channels
  • Lateral Movement – Move around the network
  • Management – Host management and auxilary
  • Persistence – Survive reboots
  • Privesc – Privilege escalation capabilities
  • Recon – Test further entry points (HTTP Basic Auth etc)
  • Situational Awareness – Network awareness
  • Trollsploit – For the lulz

Why Empire PowerShell?

PowerShell offers a multitude of offensive advantages, including:

  • Full .NET access
  • Application whitelisting
  • Direct access to the Win32 API
  • Ability to assemble malicious binaries in memor
  • Default installation on Windows 7+.

Powershell for Pentesters had a watershed year in 2014, but despite the multitude of useful projects, many pen-testers still struggle to integrate PowerShell into their engagements in a secure manner.


How PowerShell Empire Hacking Tools Works

Empire has a few components which you can chain together, similar to something like Metasploits.

It has:

Listeners – Think of this like a metasploit handler, this will catch your session.
Stagers – This is your payload, this is what you will execute on your target system.
Agents – This is how you interact with the target system, you can gather stats & info or run shell commands.

It also had fairly robust logging built in.

You can download PowerShell Empire here:

Empire-2.1.zip

Or read more here.

Posted in: Hacking Tools, Windows Hacking

Topic: Hacking Tools, Windows Hacking


Latest Posts:


Gerix WiFi Cracker - Wireless 802.11 Hacking Tool With GUI Gerix WiFi Cracker – Wireless 802.11 Hacking Tool With GUI
Gerix WiFi cracker is an easy to use Wireless 802.11 Hacking Tool with a GUI, it was originally made to run on BackTrack and this version has been updated for Kali (2018.1).
Malcom - Malware Communication Analyzer Malcom – Malware Communication Analyzer
Malcom is a Malware Communication Analyzer designed to analyze a system's network communication using graphical representations of network traffic.
WepAttack - WLAN 802.11 WEP Key Hacking Tool WepAttack – WLAN 802.11 WEP Key Hacking Tool
WepAttack is a WLAN open source Linux WEP key hacking tool for breaking 802.11 WEP keys using a wordlist based dictionary attack.
Eraser - Windows Secure Erase Hard Drive Wiper Eraser – Windows Secure Erase Hard Drive Wiper
Eraser is a hard drive wiper for Windows which allows you to run a secure erase and completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns.
Insecure software versions are a problem Web Security Stats Show XSS & Outdated Software Are Major Problems
Netsparker just published some anonymized Web Security Stats about the security vulnerabilities their online solution identified on their users’ web applications and web services during the last 3 years.
CTFR - Abuse Certificate Transparency Logs For HTTPS Subdomains CTFR – Abuse Certificate Transparency Logs For HTTPS Subdomains
CTFR is a Python-based tool to Abuse Certificate Transparency Logs to get subdomains from a HTTPS website in a few seconds.


BeautifulPeople.com Leak Exposes 1.1M Extremely Private Records

The New Acunetix V12 Engine


So another data breach, and no surprise here, but another dating site. This time the BeautifulPeople.com Leak has exposed 1.1 million customer records, including 15 million private messages sent between users.

Not so private now is it.

BeautifulPeople.com Leak Exposes 1.1M Extremely Private Records

And no surprise either the entry point for this leak, was the not-so excellent NoSQL database MongoDB which has amazing passwordless defaults and listens on ALL network interfaces rather than binding to localhost.

Sexual preference. Relationship status. Income. Address. These are just some details applicants for the controversial dating site BeautifulPeople.com are asked to supply before their physical appeal is judged by the existing user base, who vote on who is allowed in to the “elite” club based on looks alone. All of this, of course, is supposed to remain confidential. But much of that supposedly-private information is now public, thanks to the leak of a database containing sensitive data of 1.1 million BeautifulPeople.com users. The leak, according to one researcher, also included 15 million private messages between users. Another said the data is now being sold by traders lurking in the murky corners of the web.

But the information – which now appears to be real user data despite being hosted on a non-production server – was taken by one or more less-than-scrupulous individuals before the lockdown, making it out into the dirty world of data trading this year. That’s according to Troy Hunt, an Australian security expert who runs the website HaveIBeenPwned.com, where people can check if their own information has been leaked in some of the biggest breaches in recent memory, from Adobe to Ashley Madison.


It seems like the records are for sale on the shadier parts of the web and actively being traded by those who trade these kind of things. Fortunately payment details weren’t leaked, and passwords were encrypted.

So it’s a privacy issue more than a financial loss or threat, but as always this kind of info is a goldmine for social engineering, blackmail and identity theft.

Two BeautifulPeople.com users confirmed their information was in the leaked database, which also contained encrypted passwords. They shared their entries as found in the database, which showed an entry for descriptions of themselves, revealing more private details about their personal lives. One confirmed the latitude and longitude details were correct, pointing to Cambridge, UK, where they’d signed up.

BeautifulPeople.com, which brags about being “the largest network of attractive people in the world”, has courted controversy in the past by removing thousands of users from the service for not being attractive enough. In 2009, it boasted 1.8 million “ugly people” had been denied access to the site. In 2010, 5,000 were culled after gaining too much weight over a festive break. Last year, weight gain and ageing led to another 3,000 being thrown out.

Today, the company re-sent its original statement on the breach, first received by FORBES in December. “We can confirm we were notified of a breach on December 24th of 2015 of one of our MongoDB test servers. This was a staging server and not part of our production data base. The staging server was immediately shut down.” The company claimed all affected members were informed of “the vulnerability” in December, whilst noting passwords were encrypted and no financial data was exposed.

The user data apparently is only for users that signed up and were active before July 2015, anyone who joined after that shouldn’t be affected.

And yah, be careful with your staging servers – don’t have production data on them unless you absolutely have to (which honestly you don’t). You can mock whatever data structures you need to develop on it.

And don’t use MongoDB.

Source: Forbes

Posted in: Exploits/Vulnerabilities, Privacy, Web Hacking

Topic: Exploits/Vulnerabilities, Privacy, Web Hacking


Latest Posts:


Gerix WiFi Cracker - Wireless 802.11 Hacking Tool With GUI Gerix WiFi Cracker – Wireless 802.11 Hacking Tool With GUI
Gerix WiFi cracker is an easy to use Wireless 802.11 Hacking Tool with a GUI, it was originally made to run on BackTrack and this version has been updated for Kali (2018.1).
Malcom - Malware Communication Analyzer Malcom – Malware Communication Analyzer
Malcom is a Malware Communication Analyzer designed to analyze a system's network communication using graphical representations of network traffic.
WepAttack - WLAN 802.11 WEP Key Hacking Tool WepAttack – WLAN 802.11 WEP Key Hacking Tool
WepAttack is a WLAN open source Linux WEP key hacking tool for breaking 802.11 WEP keys using a wordlist based dictionary attack.
Eraser - Windows Secure Erase Hard Drive Wiper Eraser – Windows Secure Erase Hard Drive Wiper
Eraser is a hard drive wiper for Windows which allows you to run a secure erase and completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns.
Insecure software versions are a problem Web Security Stats Show XSS & Outdated Software Are Major Problems
Netsparker just published some anonymized Web Security Stats about the security vulnerabilities their online solution identified on their users’ web applications and web services during the last 3 years.
CTFR - Abuse Certificate Transparency Logs For HTTPS Subdomains CTFR – Abuse Certificate Transparency Logs For HTTPS Subdomains
CTFR is a Python-based tool to Abuse Certificate Transparency Logs to get subdomains from a HTTPS website in a few seconds.


Google Rapid Response (GRR ) – Remote Live Forensics For Incident Response

The New Acunetix V12 Engine


GRR Rapid Response is an incident response framework focused on remote live forensics. It based on client server architecture, so there’s an agent which is installed on target systems and a Python server infrastructure that can manage and communicate with the agents.

Google Rapid Response (GRR ) - Remote Live Forensics For Incident Response

There are agents for Windows, Linux and Mac OS X environments.

Overview

To function, an agent is deployed on systems that one might want to investigate. Once deployed, each system becomes a GRR client and they can start receiving messages from the frontend servers. Each message tells the client to run a specific client action and return the results. A client action is simply some well known code the agent knows how to execute (such as obtaining the list of files in a directory or reading a buffer from a file).

These actions are invoked server-side through what we call flows. A flow is a piece of server-side code that asks the GRR system to schedule remote calls to a client and has some additional logic to decide what to do based on the call results.

This flow is running on a client because a user initiated it. To do so, he probably used the web-based Graphical User Interface (GUI), which allows a GRR user to start flows for clients and review the results. Or he could also have used the text-based console to do the same.

Any flow that can be run on a single machine can also be run as a Hunt. A hunt allows running a flow on all, or any subset of machines talking to the GRR server.

Client Features

  • Cross-platform support for Linux, OS X and Windows clients.
  • Live remote memory analysis using open source memory drivers for Linux, OS X and Windows via the Rekall memory analysis framework.
  • Powerful search and download capabilities for files and the Windows registry.
  • Secure communication infrastructure designed for Internet deployment.
  • Client automatic update support.
  • Detailed monitoring of client CPU, memory, IO usage and self-imposed limits.

Server Features

  • Fully fledged response capabilities handling most incident response and forensics tasks.
  • OS-level and raw file system access, using the SleuthKit (TSK).
  • Enterprise hunting (searching across a fleet of machines) support.
  • Fully scalable back-end to handle very large deployments.
  • Automated scheduling for recurring tasks.
  • Fast and simple collection of hundreds of digital forensic artifacts.
  • Asynchronous design allows future task scheduling for clients, designed to work with a large fleet of laptops.
  • AngularJS Web UI and RESTful JSON API.
  • Fully scriptable IPython console access.
  • Basic system timelining features.
  • Basic reporting infrastructure.

You can download GRR here:

1. Run the Docker image, info here: https://github.com/google/grr-doc/blob/master/docker.adoc
2. Install fresh on a Linux system, needs 1GB RAM (AWS free instance isn’t powerful enough):

Or read more here.

Posted in: Countermeasures, Forensics, Security Software

Topic: Countermeasures, Forensics, Security Software


Latest Posts:


Gerix WiFi Cracker - Wireless 802.11 Hacking Tool With GUI Gerix WiFi Cracker – Wireless 802.11 Hacking Tool With GUI
Gerix WiFi cracker is an easy to use Wireless 802.11 Hacking Tool with a GUI, it was originally made to run on BackTrack and this version has been updated for Kali (2018.1).
Malcom - Malware Communication Analyzer Malcom – Malware Communication Analyzer
Malcom is a Malware Communication Analyzer designed to analyze a system's network communication using graphical representations of network traffic.
WepAttack - WLAN 802.11 WEP Key Hacking Tool WepAttack – WLAN 802.11 WEP Key Hacking Tool
WepAttack is a WLAN open source Linux WEP key hacking tool for breaking 802.11 WEP keys using a wordlist based dictionary attack.
Eraser - Windows Secure Erase Hard Drive Wiper Eraser – Windows Secure Erase Hard Drive Wiper
Eraser is a hard drive wiper for Windows which allows you to run a secure erase and completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns.
Insecure software versions are a problem Web Security Stats Show XSS & Outdated Software Are Major Problems
Netsparker just published some anonymized Web Security Stats about the security vulnerabilities their online solution identified on their users’ web applications and web services during the last 3 years.
CTFR - Abuse Certificate Transparency Logs For HTTPS Subdomains CTFR – Abuse Certificate Transparency Logs For HTTPS Subdomains
CTFR is a Python-based tool to Abuse Certificate Transparency Logs to get subdomains from a HTTPS website in a few seconds.


SamParser – Parse SAM Registry Hives With Python

Use Netsparker


SamParser is a Python script used to parse SAM registry hives for both users and groups, it’s only dependency is python-registry.

SamParser - Parse SAM Registry Hives With Python

This would be a great little script to write into another toolset or larger attack pattern, especially if you’re already using a Python kit or framework.

Dependencies

Usage

Sample Output

You can download SamParser here:

samparser.py

Or read more here.

Posted in: Password Cracking, Windows Hacking

Topic: Password Cracking, Windows Hacking


Latest Posts:


Gerix WiFi Cracker - Wireless 802.11 Hacking Tool With GUI Gerix WiFi Cracker – Wireless 802.11 Hacking Tool With GUI
Gerix WiFi cracker is an easy to use Wireless 802.11 Hacking Tool with a GUI, it was originally made to run on BackTrack and this version has been updated for Kali (2018.1).
Malcom - Malware Communication Analyzer Malcom – Malware Communication Analyzer
Malcom is a Malware Communication Analyzer designed to analyze a system's network communication using graphical representations of network traffic.
WepAttack - WLAN 802.11 WEP Key Hacking Tool WepAttack – WLAN 802.11 WEP Key Hacking Tool
WepAttack is a WLAN open source Linux WEP key hacking tool for breaking 802.11 WEP keys using a wordlist based dictionary attack.
Eraser - Windows Secure Erase Hard Drive Wiper Eraser – Windows Secure Erase Hard Drive Wiper
Eraser is a hard drive wiper for Windows which allows you to run a secure erase and completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns.
Insecure software versions are a problem Web Security Stats Show XSS & Outdated Software Are Major Problems
Netsparker just published some anonymized Web Security Stats about the security vulnerabilities their online solution identified on their users’ web applications and web services during the last 3 years.
CTFR - Abuse Certificate Transparency Logs For HTTPS Subdomains CTFR – Abuse Certificate Transparency Logs For HTTPS Subdomains
CTFR is a Python-based tool to Abuse Certificate Transparency Logs to get subdomains from a HTTPS website in a few seconds.


Apple Will Not Patch Windows QuickTime Vulnerabilities

The New Acunetix V12 Engine


Much like Adobe Flash, QuickTime from Apple is a bit of a relic some pretty serious, remote code execution type Windows QuickTime Vulnerabilities were recently discovered by Trend Micro. Apple has officially stated that they won’t be fixing them and the official line on this, is to uninstall QuickTime.

Apple Will Not Patch Windows QuickTime Vulnerabilities

I guess a lot of people don’t use it any more (I haven’t had used it for years, since movie trailers used to be common in QuickTime format), but still have it installed. So, uninstall it, and pass the message around to any Windows users, and organisations with Windows desktops that might quite often have QuickTime in the white-list for software.

RIP QuickTime for Windows. Apple is “deprecating support” for the application, and will no longer patch security flaws in the software.

The iGiant is also quietly advising users to uninstall the media player from their Windows machines to avoid being hacked.

Word of the end of support comes from infosec biz Trend Micro. It discovered two critical flaws in the Windows build of QuickTime and reported them to Apple. In response, Trend told The Register, the iPhone maker said it won’t fix the bugs, and is cutting the application loose.

Both of the vulnerabilities – ZDI-16-241 and ZDI-16-242 – are heap-corruption-based remote code execution vulnerabilities.

An attacker can exploit these flaws to hijack a victim’s PC and infect it with malware, simply by tricking them into opening a malicious file or web download. Apple’s response: uninstall QuickTime for Windows.

“We’re not aware of any active attacks against these vulnerabilities currently. But the only way to protect your Windows systems from potential attacks against these or other vulnerabilities in Apple QuickTime now is to uninstall it,” said Christopher Budd, global threat communications manager at Trend Micro, on Thursday.


Fortunately there’s no reports of these attacks in the wild so far, but now the vulnerability details are public, and all the bad actors have to do is get people to open a malicious QuickTime file – I’d expect it to become a real attack fairly soon.

And the fact, they have some time to write the exploit and make it reliable as there will be no patch for these vulnerabilities, ever.

“In this regard, QuickTime for Windows now joins Microsoft Windows XP and Oracle Java 6 as software that is no longer being updated to fix vulnerabilities, and subject to ever-increasing risk as more and more unpatched vulnerabilities are found affecting it.”

The flaws were reported to Apple on November 11, 2015, and acknowledged the same day by Cupertino. The following March, Apple told Trend Micro that “the product would be deprecated on Windows and the vendor would publish removal instructions for users.”

Bizarrely, Apple doesn’t seem to have mentioned the change of heart over QuickTime to anyone else. The iOS goliath last updated QuickTime for Windows in January, and there appears to have been no general warning to users that support is being dropped. For what it’s worth, QuickTime has never played nice with Windows 8 or 10, and its web plugin was disabled by default in that January update.

Given the short lead time between vulnerabilities being announced and malware writers exploiting them, Trend’s disclosures today could turn into a serious security headache. QuickTime has been available for Windows for over 20 years and there’s a considerable installed base of users out there, all of whom are now at risk.

It’s also a pretty poor play by Apple IMHO as a lot of video editing software and various other things rely on QuickTime DLL files and QuickTime has it’s own updater built into the Windows Apple software management thing.

I hope this doesn’t turn into a security disaster, although honestly – it has the potential to. Especially for corporate networks running old versions of Windows that have QuickTime installed to support a bunch of legacy features they still use. Enterprise software…is not residing in 2016.

Source: The Register

Posted in: Apple, Exploits/Vulnerabilities, Windows Hacking

Topic: Apple, Exploits/Vulnerabilities, Windows Hacking


Latest Posts:


Gerix WiFi Cracker - Wireless 802.11 Hacking Tool With GUI Gerix WiFi Cracker – Wireless 802.11 Hacking Tool With GUI
Gerix WiFi cracker is an easy to use Wireless 802.11 Hacking Tool with a GUI, it was originally made to run on BackTrack and this version has been updated for Kali (2018.1).
Malcom - Malware Communication Analyzer Malcom – Malware Communication Analyzer
Malcom is a Malware Communication Analyzer designed to analyze a system's network communication using graphical representations of network traffic.
WepAttack - WLAN 802.11 WEP Key Hacking Tool WepAttack – WLAN 802.11 WEP Key Hacking Tool
WepAttack is a WLAN open source Linux WEP key hacking tool for breaking 802.11 WEP keys using a wordlist based dictionary attack.
Eraser - Windows Secure Erase Hard Drive Wiper Eraser – Windows Secure Erase Hard Drive Wiper
Eraser is a hard drive wiper for Windows which allows you to run a secure erase and completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns.
Insecure software versions are a problem Web Security Stats Show XSS & Outdated Software Are Major Problems
Netsparker just published some anonymized Web Security Stats about the security vulnerabilities their online solution identified on their users’ web applications and web services during the last 3 years.
CTFR - Abuse Certificate Transparency Logs For HTTPS Subdomains CTFR – Abuse Certificate Transparency Logs For HTTPS Subdomains
CTFR is a Python-based tool to Abuse Certificate Transparency Logs to get subdomains from a HTTPS website in a few seconds.


Recon-ng – Web Reconnaissance Framework

The New Acunetix V12 Engine


Recon-ng is a full-featured Web Reconnaissance Framework written in Python. Complete with independent modules, database interaction, interactive help, and command completion – Recon-ng provides a powerful environment in which open source web-based reconnaissance can be conducted quickly and thoroughly.

Recon-ng - Web Reconnaissance Framework


Recon-ng has a look and feel and even command flow similar to the Metasploit Framework, reducing the learning curve for leveraging the framework. It is of course quite different though, Recon-ng is not designed to compete with existing frameworks, as it is designed exclusively for web-based open source reconnaissance.

If you want to exploit, use the Metasploit Framework. If you want to social engineer, use the Social-Engineer Toolkit. If you want to conduct passive reconnaissance, use Recon-ng!

An example on active reconnaissance would be Skipfish by the Google Security Team.

What is Recon-ng?

Recon ng is a completely modular framework and makes it easy for even the newest of Python developers to contribute. Each module is a subclass of the “module” class. The “module” class is a customized “cmd” interpreter equipped with built-in functionality that provides simple interfaces to common tasks such as standardizing output, interacting with the database, making web requests, and managing API keys. Therefore, all the hard work has been done. Building modules is simple and takes little more than a few minutes.

Recon-ng Modules

Recon-ng comes with ~80 recon moduloes, 2 discovery modules, 2 exploitation modules, 7 reporting modules and 2 import modules.

  • cache_snoop – DNS Cache Snooper
  • interesting_files – Interesting File Finder
  • command_injector – Remote Command Injection Shell Interface
  • xpath_bruter – Xpath Injection Brute Forcer
  • csv_file – Advanced CSV File Importer
  • list – List File Importer
  • point_usage – Jigsaw – Point Usage Statistics Fetcher
  • purchase_contact – Jigsaw – Single Contact Retriever
  • search_contacts – Jigsaw Contact Enumerator
  • jigsaw_auth – Jigsaw Authenticated Contact Enumerator
  • linkedin_auth – LinkedIn Authenticated Contact Enumerator
  • github_miner – Github Resource Miner
  • whois_miner – Whois Data Miner
  • bing_linkedin – Bing Linkedin Profile Harvester
  • email_validator – SalesMaple Email Validator
  • mailtester – MailTester Email Validator
  • mangle – Contact Name Mangler
  • unmangle – Contact Name Unmangler
  • hibp_breach – Have I been pwned? Breach Search
  • hibp_paste – Have I been pwned? Paste Search
  • pwnedlist – PwnedList Validator
  • migrate_contacts – Contacts to Domains Data Migrator
  • facebook_directory – Facebook Directory Crawler
  • fullcontact – FullContact Contact Enumerator
  • adobe – Adobe Hash Cracker
  • bozocrack – PyBozoCrack Hash Lookup
  • hashes_org – Hashes.org Hash Lookup
  • leakdb – leakdb Hash Lookup
  • metacrawler – Meta Data Extractor
  • pgp_search – PGP Key Owner Lookup
  • salesmaple – SalesMaple Contact Harvester
  • whois_pocs – Whois POC Harvester
  • account_creds – PwnedList – Account Credentials Fetcher
  • api_usage – PwnedList – API Usage Statistics Fetcher
  • domain_creds – PwnedList – Pwned Domain Credentials Fetcher
  • domain_ispwned – PwnedList – Pwned Domain Statistics Fetcher
  • leak_lookup – PwnedList – Leak Details Fetcher
  • leaks_dump – PwnedList – Leak Details Fetcher
  • brute_suffix – DNS Public Suffix Brute Forcer
  • baidu_site – Baidu Hostname Enumerator
  • bing_domain_api – Bing API Hostname Enumerator
  • bing_domain_web – Bing Hostname Enumerator
  • brute_hosts – DNS Hostname Brute Forcer
  • builtwith – BuiltWith Enumerator
  • google_site_api – Google CSE Hostname Enumerator
  • google_site_web – Google Hostname Enumerator
  • netcraft – Netcraft Hostname Enumerator
  • shodan_hostname – Shodan Hostname Enumerator
  • ssl_san – SSL SAN Lookup
  • vpnhunter – VPNHunter Lookup
  • yahoo_domain – Yahoo Hostname Enumerator
  • zone_transfer – DNS Zone File Harvester
  • ghdb – Google Hacking Database
  • punkspider – PunkSPIDER Vulnerabilty Finder
  • xssed – XSSed Domain Lookup
  • xssposed – XSSposed Domain Lookup
  • migrate_hosts – Hosts to Domains Data Migrator
  • bing_ip – Bing API IP Neighbor Enumerator
  • freegeoip – FreeGeoIP
  • ip_neighbor – My-IP-Neighbors.com Lookup
  • ipinfodb – IPInfoDB GeoIP
  • resolve – Hostname Resolver
  • reverse_resolve – Reverse Resolver
  • ssltools – SSLTools.com Host Name Lookups
  • geocode – Address Geocoder
  • reverse_geocode – Reverse Geocoder
  • flickr – Flickr Geolocation Search
  • instagram – Instagram Geolocation Search
  • picasa – Picasa Geolocation Search
  • shodan – Shodan Geolocation Search
  • twitter – Twitter Geolocation Search
  • whois_orgs – Whois Company Harvester
  • reverse_resolve – Reverse Resolver
  • shodan_net – Shodan Network Enumerator
  • census_2012 – Internet Census 2012 Lookup
  • sonar_cio – Project Sonar Lookup
  • migrate_ports – Ports to Hosts Data Migrator
  • dev_diver – Dev Diver Repository Activity Examiner
  • linkedin – Linkedin Contact Crawler
  • linkedin_crawl – Linkedin Profile Crawler
  • namechk – NameChk.com Username Validator
  • profiler – OSINT HUMINT Profile Collector
  • twitter – Twitter Handles
  • github_repos – Github Code Enumerator
  • gists_search – Github Gist Searcher
  • github_dorks – Github Dork Analyzer
  • csv – CSV File Creator
  • html – HTML Report Generator
  • json – JSON Report Generator
  • list – List Creator
  • pushpin – PushPin Report Generator
  • xlsx – XLSX File Creator
  • xml – XML Report Generator

Recon ng Dependencies

All 3rd party libraries/packages should be installed prior to use. The framework checks for the presence of the following dependencies at runtime and disables the modules affected by missing dependencies.

  • dnspython
  • dicttoxml
  • jsonrpclib
  • lxml
  • mechanize
  • slowaes
  • XlsxWriter

You can download Recon-ng here:

To install:

Change into the Recon-ng directory.

Install dependencies.

Or read on how to use Recon-ng here.

Posted in: Hacking Tools

Topic: Hacking Tools


Latest Posts:


Gerix WiFi Cracker - Wireless 802.11 Hacking Tool With GUI Gerix WiFi Cracker – Wireless 802.11 Hacking Tool With GUI
Gerix WiFi cracker is an easy to use Wireless 802.11 Hacking Tool with a GUI, it was originally made to run on BackTrack and this version has been updated for Kali (2018.1).
Malcom - Malware Communication Analyzer Malcom – Malware Communication Analyzer
Malcom is a Malware Communication Analyzer designed to analyze a system's network communication using graphical representations of network traffic.
WepAttack - WLAN 802.11 WEP Key Hacking Tool WepAttack – WLAN 802.11 WEP Key Hacking Tool
WepAttack is a WLAN open source Linux WEP key hacking tool for breaking 802.11 WEP keys using a wordlist based dictionary attack.
Eraser - Windows Secure Erase Hard Drive Wiper Eraser – Windows Secure Erase Hard Drive Wiper
Eraser is a hard drive wiper for Windows which allows you to run a secure erase and completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns.
Insecure software versions are a problem Web Security Stats Show XSS & Outdated Software Are Major Problems
Netsparker just published some anonymized Web Security Stats about the security vulnerabilities their online solution identified on their users’ web applications and web services during the last 3 years.
CTFR - Abuse Certificate Transparency Logs For HTTPS Subdomains CTFR – Abuse Certificate Transparency Logs For HTTPS Subdomains
CTFR is a Python-based tool to Abuse Certificate Transparency Logs to get subdomains from a HTTPS website in a few seconds.