Recon-ng is an open-source framework
coded in python by Tim Tomes a.k.a LaNMaSteR53. Its interface is modeled
after the look of the Metasploit Framework but it is not meant for
exploitation or for spawning a meterpreter session or a shell, it is for
web-based reconnaissance and information gathering. It comes with
modules to support your web reconnaissance adventure and information
gathering just like Metasploit's auxiliary and exploit modules. Modules
are categorized into Discovery, Experimental, Recon and Reporting.
As of this writing here are the modules with its subcategories:
Discovery
---------
discovery/exploitable/http/dnn
_fcklinkgallery
discovery/exploitable/http/gen eric_restaurantmenu
discovery/exploitable/http/web wiz_rte
discovery/info_disclosure/dns/ cache_snoop
discovery/info_disclosure/http /backup_finder
discovery/info_disclosure/http /google_ids
discovery/info_disclosure/http /interesting_files
Experimental
------------
experimental/rce
Recon
-----
recon/contacts/enum/http/web/d ev_diver
recon/contacts/enum/http/web/n amechk
recon/contacts/enum/http/web/p wnedlist
recon/contacts/enum/http/web/s hould_change_password
recon/contacts/gather/http/api /jigsaw/point_usage
recon/contacts/gather/http/api /jigsaw/purchase_contact
recon/contacts/gather/http/api /jigsaw/search_contacts
recon/contacts/gather/http/api /linkedin_auth
recon/contacts/gather/http/api /twitter
recon/contacts/gather/http/api /whois_pocs
recon/contacts/gather/http/web /jigsaw
recon/contacts/gather/http/web /pgp_search
recon/contacts/support/add_con tact
recon/contacts/support/mangle
recon/creds/enum/http/api/leak db
recon/creds/enum/http/api/nois ette
recon/creds/gather/http/api/pw nedlist/account_creds
recon/creds/gather/http/api/pw nedlist/api_usage
recon/creds/gather/http/api/pw nedlist/domain_creds
recon/creds/gather/http/api/pw nedlist/domain_ispwned
recon/creds/gather/http/api/pw nedlist/leak_lookup
recon/creds/gather/http/api/pw nedlist/leaks_dump
recon/hosts/enum/dns/resolve
recon/hosts/enum/http/api/buil twith
recon/hosts/enum/http/api/punk spider
recon/hosts/enum/http/api/wasc ompanyhacked
recon/hosts/enum/http/api/what web
recon/hosts/enum/http/api/whoi s_lookup
recon/hosts/enum/http/web/age_ analyzer
recon/hosts/enum/http/web/asaf aweb
recon/hosts/enum/http/web/gend er_analyzer
recon/hosts/enum/http/web/ipvo id
recon/hosts/enum/http/web/malw aredomain
recon/hosts/enum/http/web/mywo t
recon/hosts/enum/http/web/netb ios
recon/hosts/enum/http/web/netc raft_history
recon/hosts/enum/http/web/open _resolvers
recon/hosts/enum/http/web/urlv oid
recon/hosts/enum/http/web/web_ archive
recon/hosts/enum/http/web/xsse d
recon/hosts/gather/dns/brute_f orce
recon/hosts/gather/http/api/bi ng_ip
recon/hosts/gather/http/api/go ogle_site
recon/hosts/gather/http/api/sh odan_hostname
recon/hosts/gather/http/web/ba idu_site
recon/hosts/gather/http/web/bi ng_site
recon/hosts/gather/http/web/ce nsus_2012
recon/hosts/gather/http/web/go ogle_site
recon/hosts/gather/http/web/ip _neighbor
recon/hosts/gather/http/web/mc afee/mcafee_affil
recon/hosts/gather/http/web/mc afee/mcafee_dns
recon/hosts/gather/http/web/mc afee/mcafee_mail
recon/hosts/gather/http/web/ne tcraft
recon/hosts/gather/http/web/ya hoo_site
recon/hosts/geo/http/api/hosti p
recon/hosts/geo/http/api/ipinf odb
recon/hosts/geo/http/api/maxmi nd
recon/hosts/geo/http/api/uniap ple
recon/hosts/geo/http/web/wigle
recon/hosts/support/add_host
Reporting
---------
reporting/csv_file
reporting/html_report
reporting/list
In this article I'm going to emphasize the Backup File Finder module
which I authored together with Tim Tomes (the main developer of
Recon-ng). This module can be used for checking specific hosts for
exposed backup files. The default configuration searches for
wp-config.php files which contain WordPress database configuration
information.
As a side note, this module is inspired by cmsploit.
Basic Usage:
load discovery/info_disclosure/http /backup_finder (use the module)
show options (shows the options that can be set for the module)
set source target.com (the host you want to crawl)
set uri config_file (configuration file you want to check, ex. wp-config.php)
Here is the screenshot of the Backup File Finder's actual crawling.
Now, here is what's inside in a typical configuration file:
define('DB_NAME', 'wordpress');
/** MySQL database username */
define('DB_USER', 'root');
/** MySQL database password */
define('DB_PASSWORD', 'passwd');
/** MySQL hostname */
define('DB_HOST', 'localhost');
/** Database Charset to use in creating database tables. */
define('DB_CHARSET', 'utf8');
/** The Database Collate type. Don't change this if in doubt. */
define('DB_COLLATE', '');
List of the various configuration files used by popular CMS' which can be set to the option uri:
wp-config.php >> WordPress
config.php >> phpBB, ExpressionEngine
configuration.php >> Joomla
LocalSettings.php >>MediaWiki
mt-config.cgi >> Movable Type
settings.php >> Drupal
About The Author
This article has been written by Jay Turla, he is a security researcher at Infosec, along with security research he also performs vulnerability research too.
As of this writing here are the modules with its subcategories:
---------
discovery/exploitable/http/dnn
discovery/exploitable/http/gen
discovery/exploitable/http/web
discovery/info_disclosure/dns/
discovery/info_disclosure/http
discovery/info_disclosure/http
discovery/info_disclosure/http
Experimental
------------
experimental/rce
Recon
-----
recon/contacts/enum/http/web/d
recon/contacts/enum/http/web/n
recon/contacts/enum/http/web/p
recon/contacts/enum/http/web/s
recon/contacts/gather/http/api
recon/contacts/gather/http/api
recon/contacts/gather/http/api
recon/contacts/gather/http/api
recon/contacts/gather/http/api
recon/contacts/gather/http/api
recon/contacts/gather/http/web
recon/contacts/gather/http/web
recon/contacts/support/add_con
recon/contacts/support/mangle
recon/creds/enum/http/api/leak
recon/creds/enum/http/api/nois
recon/creds/gather/http/api/pw
recon/creds/gather/http/api/pw
recon/creds/gather/http/api/pw
recon/creds/gather/http/api/pw
recon/creds/gather/http/api/pw
recon/creds/gather/http/api/pw
recon/hosts/enum/dns/resolve
recon/hosts/enum/http/api/buil
recon/hosts/enum/http/api/punk
recon/hosts/enum/http/api/wasc
recon/hosts/enum/http/api/what
recon/hosts/enum/http/api/whoi
recon/hosts/enum/http/web/age_
recon/hosts/enum/http/web/asaf
recon/hosts/enum/http/web/gend
recon/hosts/enum/http/web/ipvo
recon/hosts/enum/http/web/malw
recon/hosts/enum/http/web/mywo
recon/hosts/enum/http/web/netb
recon/hosts/enum/http/web/netc
recon/hosts/enum/http/web/open
recon/hosts/enum/http/web/urlv
recon/hosts/enum/http/web/web_
recon/hosts/enum/http/web/xsse
recon/hosts/gather/dns/brute_f
recon/hosts/gather/http/api/bi
recon/hosts/gather/http/api/go
recon/hosts/gather/http/api/sh
recon/hosts/gather/http/web/ba
recon/hosts/gather/http/web/bi
recon/hosts/gather/http/web/ce
recon/hosts/gather/http/web/go
recon/hosts/gather/http/web/ip
recon/hosts/gather/http/web/mc
recon/hosts/gather/http/web/mc
recon/hosts/gather/http/web/mc
recon/hosts/gather/http/web/ne
recon/hosts/gather/http/web/ya
recon/hosts/geo/http/api/hosti
recon/hosts/geo/http/api/ipinf
recon/hosts/geo/http/api/maxmi
recon/hosts/geo/http/api/uniap
recon/hosts/geo/http/web/wigle
recon/hosts/support/add_host
Reporting
---------
reporting/csv_file
reporting/html_report
reporting/list
I am also one of the contributors for this framework and has contributed mostly to the Discovery modules.
As a side note, this module is inspired by cmsploit.
Basic Usage:
load discovery/info_disclosure/http
show options (shows the options that can be set for the module)
set source target.com (the host you want to crawl)
set uri config_file (configuration file you want to check, ex. wp-config.php)
Here is the screenshot of the Backup File Finder's actual crawling.
Now, here is what's inside in a typical configuration file:
define('DB_NAME', 'wordpress');
/** MySQL database username */
define('DB_USER', 'root');
/** MySQL database password */
define('DB_PASSWORD', 'passwd');
/** MySQL hostname */
define('DB_HOST', 'localhost');
/** Database Charset to use in creating database tables. */
define('DB_CHARSET', 'utf8');
/** The Database Collate type. Don't change this if in doubt. */
define('DB_COLLATE', '');
List of the various configuration files used by popular CMS' which can be set to the option uri:
wp-config.php >> WordPress
config.php >> phpBB, ExpressionEngine
configuration.php >> Joomla
LocalSettings.php >>MediaWiki
mt-config.cgi >> Movable Type
settings.php >> Drupal
About The Author
This article has been written by Jay Turla, he is a security researcher at Infosec, along with security research he also performs vulnerability research too.
No comments:
Post a Comment