Cyber security

CspReconGo – Streamlining Web Security With Domain Analysis

CspReconGo is a command-line tool designed for cybersecurity analysts, web developers, and IT professionals.

It automates the extraction and analysis of domains from Content Security Policy (CSP) headers and JavaScript files on websites.

This tool is essential for conducting detailed web security audits, understanding external resource interactions, and monitoring changes in CSP and JavaScript-based domain references.

Key Features

  • CSP Header Analysis: Parses CSP headers to identify domains, helping users understand the website’s security policies and external dependencies.
  • JavaScript File Analysis: Automatically fetches and analyzes JavaScript files linked by the website, extracting domain references to reveal third-party integrations and external scripts.
  • TODO Domain Tracking Across Runs: Compares results between runs, highlighting newly detected domains, which is invaluable for monitoring changes over time.
  • Structured Output: Neatly organizes and documents the detected domains with a count of unique entries, outputting the results in a user-friendly format for further analysis.

Getting Started

Prerequisites

Installation

  1. Download Source Code: Clone the repository or download the source code to your local machine.
git clone https://github.com/yourusername/CspReconGo.git

2. Download Dependancies:

go get -u github.com/chromedp/chromedp

Use

  1. Use as:
go run CspReconGo.go https://www.examplewebsite.com
Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

How to Install Docker on Ubuntu (Step-by-Step Guide)

Docker is a powerful open-source containerization platform that allows developers to build, test, and deploy…

2 hours ago

Uninstall Docker on Ubuntu

Docker is one of the most widely used containerization platforms. But there may come a…

2 hours ago

Admin Panel Dorks : A Complete List of Google Dorks

Introduction Google Dorking is a technique where advanced search operators are used to uncover information…

1 day ago

Log Analysis Fundamentals

Introduction In cybersecurity and IT operations, logging fundamentals form the backbone of monitoring, forensics, and…

2 days ago

Networking Devices 101: Understanding Routers, Switches, Hubs, and More

What is Networking? Networking brings together devices like computers, servers, routers, and switches so they…

3 days ago

Sock Puppets in OSINT: How to Build and Use Research Accounts

Introduction In the world of Open Source Intelligence (OSINT), anonymity and operational security (OPSEC) are…

3 days ago