Pre-made commands

Standard usage
autorecon {IP address}
Multi-target scan
autorecon -t {list of IPs}
Open a http server after scan is complete from the results folder
python3 -m http.server 8081

Flags

FlagDescription
-tTarget file
—proxychainsUse this if running autorecon via proxychains

Tools Used

Ensure they’re all installed with this command
sudo apt install seclists curl dnsrecon enum4linux feroxbuster gobuster impacket-scripts nbtscan nikto nmap onesixtyone oscanner redis-tools smbclient smbmap snmp sslscan sipvicious tnscmd10g whatweb wkhtmltopdf

Results

By default, results will be stored in the ./results directory. A new sub directory is created for every target. The structure of this sub directory is:

.
├── exploit/
├── loot/
├── report/
│   ├── local.txt
│   ├── notes.txt
│   ├── proof.txt
│   └── screenshots/
└── scans/
	├── _commands.log
	├── _manual_commands.txt
	├── tcp80/
	├── udp53/
	└── xml/