Pre-made commands
Standard usage
autorecon {IP address}Multi-target scan
autorecon -t {list of IPs}Open a http server after scan is complete from the results folder
python3 -m http.server 8081Flags
| Flag | Description | |
|---|---|---|
| -t | Target file | |
| —proxychains | Use this if running autorecon via proxychains |
Tools Used
- curl
- dnsrecon
- enum4linux
- feroxbuster
- gobuster
- impacket-scripts
- nbtscan
- nikto
- nmap
- onesixtyone
- oscanner
- redis-tools
- smbclient
- smbmap
- snmpwalk
- sslscan
- svwar
- tnscmd10g
- whatweb
- wkhtmltopdf
Ensure they’re all installed with this command
sudo apt install seclists curl dnsrecon enum4linux feroxbuster gobuster impacket-scripts nbtscan nikto nmap onesixtyone oscanner redis-tools smbclient smbmap snmp sslscan sipvicious tnscmd10g whatweb wkhtmltopdfResults
By default, results will be stored in the ./results directory. A new sub directory is created for every target. The structure of this sub directory is:
.
├── exploit/
├── loot/
├── report/
│ ├── local.txt
│ ├── notes.txt
│ ├── proof.txt
│ └── screenshots/
└── scans/
├── _commands.log
├── _manual_commands.txt
├── tcp80/
├── udp53/
└── xml/