Reconnaissance Swiss army knife
Main Features Wizard and CLA interface You can extract targets from STDIN (channeled input) and act on them According to specialists in digital forensics from the International Institute of Cyber Security, all information is extracted with API, and no direct contact is established with the target Utilities Censys: uses censys.io to collect a large amount of information about an IP address NS Lookup: Performs name server search Port scan: Scans the most common TCP ports Detect CMS: Can detect more than 400 content management systems Whois Lookup: Performs whois protocol search Detect honeypot: Uses Shodan to identify whether the target is a honeypot Find subdomains: Search for sub-domains using com Reverse IP Lookup: Does an inverse IP lookup to find domains associated with an IP address Detect technologies: Uses wappalyzer.com to detect over a thousand technologies All: According to experts in digital forensics, this utility executes all the previous utilities in the target Compatibility
ReconDog runs on any system that has a Python interpreter installed. Experts in digital forensics report that this tool has been tested in the following configurations:
Windows, Linux and MAC operating systems Versions of Python 2.7 to 3.6 Installation
ReconDog does not require manual configuration and can be run simply as a normal Python script.
The wizard interface is the easiest way to use ReconDog. Just run the program, select what you want to do and enter the target, it’s that simple.
ReconDog also has a CLA interface. You can find subdomains in the following way:
python dog -t marvel.com -c 7
There’s still more. If you have a program that can enumerate subdomains and you want to scan ports of all the subdomains you find, ReconDog is designed to handle this type of case. Simply use this command:
subdomainfinder -t example.com | python dog –domains -c 3
No matter what type of output the other program generates, ReconDog uses regular expressions to find targets, which makes it easy to integrate literally all the tools. There are two switches available:
–domains extract domains from STDIN –ips extract ip addresses from STDIN DOWNLOAD RECONDOG