Skip to content
forked from x1mdev/ReconPi

ReconPi - A lightweight recon tool that performs extensive scanning with the latest tools.

License

Notifications You must be signed in to change notification settings

wh1tenoise/ReconPi

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Recon Pi

__________                          __________.__ 
\______   \ ____   ____  ____   ____\______   \__|
 |       _// __ \_/ ___\/  _ \ /    \|     ___/  |
 |    |   \  ___/\  \__(  <_> )   |  \    |   |  |
 |____|_  /\___  >\___  >____/|___|  /____|   |__|
        \/     \/     \/           \/             
                            v2.0 - by @x1m_martijn

ReconPi - A lightweight recon tool that performs extensive reconnaissance with the latest tools using a Raspberry Pi.

Start using that Raspberry Pi -- I know you all have one laying around somewhere ;)

Installation

Check the updated blogpost here for a complete guide on how to set up your own ReconPi: ReconPi Guide

If you prepared your Raspberry Pi through the guide linked above you should be able to continue below.

ReconPi v2.0 needs the HypriotOS (V1.10.0) image to work 100%!

Easy installation

Connect to your ReconPi with SSH:

ssh pirate@192.168.2.16 [Change IP to ReconPi IP]

Curl the install.sh script and run it:

curl -L https://raw.githubusercontent.com/x1mdev/ReconPi/master/install.sh | bash

Manual installation

Connect to your ReconPi with SSH:

$ ssh pirate@192.168.2.16 [Change IP to ReconPi IP]

Now we can set up everything, it's quite simple:

  • git clone https://github.com/x1mdev/ReconPi.git
  • cd ReconPi
  • ./install.sh
  • The script gives a reboot command at the end of install.sh, please login again to start using the ReconPi.

Grab a cup of coffee since this will take a while.

Usage

After installing all of the dependencies for the ReconPi you can finally start doing some recon!

$ recon <domain.tld>

recon.sh will first gather resolvers for the given target, followed by subdomain enumeration and checking those assets for potential subdomain takeover. When this is done the IP addresses of the target are enumerated. Open ports will be discovered accompanied by a service scan provided by Nmap.

Finally the live targets will be screenshotted and evaluated to discover endpoints.

Results will be stored on the Recon Pi and can be viewed by running `python -m SimpleHTTPServer 1337" in your results directory. Your results will be accessible from any system with a browser that exists in the same network.

Tools

Tools that are being used at this moment:

More tools will be added in the future, feel free to make a pull request!

Contributors

Support

If you like what I do, feel free to:

About

ReconPi - A lightweight recon tool that performs extensive scanning with the latest tools.

Resources

License

Code of conduct

Stars

Watchers

Forks

Packages

No packages published

Languages

  • Shell 100.0%