Powered by Blogger.
Home » » ReconCobra Complete Automated Pentest

ReconCobra Complete Automated Pentest

Written By Akademy on Saturday, January 4, 2020 | 9:42 AM

You can use ReconCobra for Kali, Parrot OS, Black Arch, Termux, Android Led TV. ReconCobra Software has 82 Options with full automation with powerful information-gathering capability.

Brief Introduction

ReconCobra is useful for Private Organisations and Ethical hacker personnel for legal auditing.
It serves as a defense method to find as much information possible for gaining unauthorized access and intrusion.
With the emergence of more advanced technology, cybercriminals have also found more ways to get into the system of many organizations.
ReconCobra software can audit, firewall behavior, if it is leaking backend machines/server and replying pings, it can find internal and external networks where many software’s like ERP, mail firewalls are installed, exposing servers so it does Footprinting, Scanning & Enumeration as much as possible of target, to discover and collect most possible information like username, web technologies, files, endpoint, API and much more.

It’s the first step to stop cyber criminals by securing your Infrastructural Information Gathering leakage. ReconCobra is false positive free when there is something it will show no matter what, if it is not, it will give blank results rather error.


University Course

ReconCobra is now also a part of International Hacking Trainings for OSINT
Cybersecurity365.com OSINT for Reconnaissance training for CEH, CISSP, Security+, ITPA

Here you can see an impression of what is possible with this tool.

    #--------------------------------------------------------
    #    Ultimate Reconnaissance for Information Gathering   
    #--------------------------------------------------------

#           [1] Website Information                                 #   
#           [2] Domain Whois Lookup                                 #   
#           [3] Find IP Location                                    #   
#           [4] Recommended Port Scan                           #   
#           [5] DNS Whois Lookup                                    #   
#           [6] Reverse Whois Lookup                                #   
#           [7] DNS Zone Transfers Lookup                           #   
#           [8] Reverse IP Lookup                                   #   
#           [9] Forward IP Lookup                                   #   
#           [10] Reverse DNS Lookup                                 #   
#           [11] Forward DNS Lookup                                 #   
#           [12] Shared DNS Lookup                                  #   
#           [13] Technology lookup                                  #   
#           [14] Website Recon                                      #   
#           [15] Metadata Crawler                                   #   
#           [16] Metadata Googler                                   #   
#           [17] Subdomain Scanner using Search Engines             #   
#           [18] Subdomain Takeover Scanner using file              #   
#           [19] Brute Subdomains using nmap                        #   
#           [20] Brute DNS Subdomains                               #   
#           [21] Find Configuration Errors on Target using google   #   
#           [22] Find ASN                                           #   
#           [23] Find Netblocks                                     #   
#           [24] Capture Screenshots                                #   
#           [25] Find Nearest Servers to Victim                     #   
#           [26] Sweep Netblocks & Resolve                          #   
#           [27] Load DNS Hacking Suite Panthera                    #   
#           [28] Find Emails and Names                              #   
#           [29] Find Contact Information                           #   
#           [30] Common Nmap Port Scan                              #   
#           [31] Ping Hop and Firewalk                              #   
#           [32] Find Internal Networks & Sweep                     #   
#           [33] Decoy Scan & Generate Metasploit Data              #   
#           [34] Find SSL Bugs & Information                        #   
#           [35] Extract Users via FTP                              #   
#           [36] Extract Users via POP3                             #   
#           [37] Extract Users via IMAP                             #   
#           [38] Extract Users via SMTP                             #   
#           [39] Extract Users via Form                             #   
#           [40] Extract Full Possible Information via SNMP         #   
#           [41] Extract Possible Information from Certificates     #   
#           [42] Find Victim HTTPS Leaked Data                      #   
#           [43] Find Users via sitemap                             #   
#           [44] Find Directories from robots.txt                   #   
#           [45] Find all accounts by user                          #   
#           [46] Find all accounts by email                         #   
#           [47] Find all tags by account                           #   
#           [48] DNS History                                        #   
#           [49] Passive DNS Search                                 #   
#           [50] Use Common Crawl on Target                         #   
#           [51] Hostname to IP Resolver using Search Engines       #   
#           [52] Reverse NS Lookup                                  #   
#           [53] Forward NS Lookup                                  #   
#           [54] Win - Extract Netbios Information                  #   
#           [55] Win - Contact & Extract Null Shares IPC$           #   
#           [56] Win - Gather Full Information via Netbios          #   
#           [57] Win - Connect to Open Netbios                      #   
#           [58] Invisible Port Scanner                             #   
#           [59] Bypass Cloud Flare                                 #   
#           [60] DNS Cached Records                                 #   
#           [61] Bypass Content Management System Waf Firewall      #   
#           [62] Shared NS                                          #   
#           [63] Master Domain Subdomain Subnet Scanner             #   
#           [64] Domain Certificate Subdomain Enumeration           #   
#           [65] Find Subdomains using API Searcher                 #   
#           [66] Find Cname Information of netblock                 #   
#           [67] Endpoint Extraction                                #   
#           [68] Check misconfigured Cross Origin Resource Sharing  #   
#           [69] Wayback Web Downloader                             #   
#           [70] JS Find Link & Analyse ( local and remote )        #   
#           [71] Extract Geo-Cordinates for Tracking                #   
#           [72] Mirror Complete Website                            #   
#           [73] Brute Forcer Module                                #   
#           [74] Databases and Connections Port Scan using Mascan   #   
#           [75] Set Daisy Chain                                    #   
#           [76] Search PHPinfo and Database Log via Search Engines #   
#           [77] Load Encrypt/Decrypt Module                        #   
#           [78] Load Encryption Scrambling for Antivirus Evasion   #   
#           [79] Load Wi-Fi Takeover Module                         #   
#           [80] Load PPTP Brute Force Module                       #   
#           [81] Load Routers/Load Balancer Interface               #   
#           [82] Tracert Visual Machine Mapper                      #


GitHub: https://github.com/haroonawanofficial/ReconCobra

Install ReconCobra:



Kali Installation

git clone https://github.com/haroonawanofficial/ReconCobra.git
cd Reconcobra
sudo chmod u+x *.sh
./Kali_Installer.sh
ReconCobra will integrate as system software
Dependencies will be handled automatically
Third-party software(s)/dependencies/modules will be handled automatically

Parrot OS Installation

git clone https://github.com/haroonawanofficial/ReconCobra.git
cd Reconcobra
chmod u+x *.sh
Bash ParrotOS_Installer.sh
ReconCobra will integrate as system software
Dependencies will be handled automatically
Third-party software(s)/dependencies/modules will be handled automatically

Termux Installation

git clone https://github.com/haroonawanofficial/ReconCobra.git
cd Reconcobra
chmod u+x *.sh
pkg install proot
type: termux-chroot
./Termux_Installer.sh
./Termux_fixme.sh
Reboot your Termux
perl ReconCobraTermux.pl
Dependencies will be handled automatically for Termux
Third-party software(s)/dependencies/modules will be handled automatically for Termux

Android Led TV Installation

Install Termux
Input USB keyboard

git clone https://github.com/haroonawanofficial/ReconCobra.git
cd Reconcobra
chmod u+x *.sh
pkg install proot
type: termux-chroot
./Termux_Installer.sh
./Termux_fixme.sh
Reboot your Termux
perl ReconCobraTermux.pl
Dependencies will be handled automatically for Termux
Third-party software(s)/dependencies/modules will be handled automatically for Termux

Black Arch Installation

Open issue, if an error occurred
git clone https://github.com/haroonawanofficial/ReconCobra.git
cd Reconcobra
chmod u+x *.sh
./BlackArch_Installer.sh
ReconCobra will integrate as system software
Dependencies will be handled automatically
Third-party software(s)/dependencies/modules will be handled automatically


IMPORTANT THINGS TO REMEMBER

  • This article was written for educational purposes and pentest only.
  • The author can not be held responsible for damages caused by the use of these resources.
  • You will not misuse the information to gain unauthorized access.
  • This information shall only be used to expand knowledge and not for causing malicious or damaging attacks.
  • Just remember, Performing any hacks without written permission is illegal ..!

Finally

If you have any questions about this article, any feedback, suggestions if you want to share your thoughts, please feel free to do it using the below comment form.
Share this article :

0 comments:

 
Trung Tâm Đào Tạo An Toàn Thông Tin Học Hacker Mũ Xám Online | Học An Ninh Mạng Trực Tuyến | CEH VIỆT NAM
Copyright © 2013. HACKER MŨ XÁM - All Rights Reserved
Web Master @ Võ Sĩ Máy Tính
Contact @ Đông Dương ICT