Reconspider : Most Advanced Open Source Intelligence (OSINT) Framework

ReconSpider is most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations and find out information from different sources.

ReconSpider can be used by Infosec Researchers, Penetration Testers, Bug Hunters and Cyber Crime Investigators to find deep information about their target.

ReconSpider aggregate all the raw data, visualize it on a dashboard and facilitate alerting and monitoring on the data.

Recon Spider also combines the capabilities of Wave,Photon and Recon Dog to do a comprehensive enumeration of attack surface.

Why it’s called ReconSpider ?

ReconSpider = Recon + Spider

  • Recon = Reconnaissance

Reconnaissance is a mission to obtain information by various detection methods, about the activities and resources of an enemy or potential enemy, or geographic characteristics of a particular area.

  • Spider = Web crawler

A Web crawler, sometimes called a spider or spiderbot and often shortened to crawler, is an Internet bot that systematically browses the World Wide Web, typically for the purpose of Web indexing (web spidering).

Version (beta)

ReconSpider : 1.0.6

Overview Of The Tool

  • Performs OSINT scan on a IP Address, Emails, Websites, Organizations and find out information from different sources.
  • Correlates and collaborate the results, show them in a consolidated manner.
  • Use specific script / launch automated OSINT for consolidated data.
  • Currently available in only Command Line Interface (CLI).

Mind Map (v1)

Check out our mind map to see visually organize information of this tool regarding api, services and techniques and more.

http://bhavkaran.com/reconspider/mindmap.html

Documentation

Installing and using ReconSpider is very easy. Installation process is very simple.

  1. Downloading or cloning ReconSpider github repository.
  2. Installing all dependencies.

Let’s Begin !!

  • Setting up the environment (Linux Operating System)

Step 1 – Cloning ReconSpider on your linux system.

In order to download ReconSpider simply clone the github repository. Below is the command which you can use in order to clone ReconSpider repository.

git clone https://github.com/bhavsec/reconspider.git

Step 2 – Make sure python3 and python3-pip is installed on your system.

You can also perform a check by typing this command in your terminal.

sudo apt install python3 python3-pip

Step 3 – Installing all dependencies.

Once you clone and check python installation, you will find directory name as reconspider. Just go to that directory and install using these commands:

cd reconspider
sudo python setup.py install

  • Setting up the environment (Windows Operating System)

Step 1 – Downloading ReconSpider on your windows system.

In order to download ReconSpider from github repository simply copy and paste this URL in your favourite browser.

https://github.com/bhavsec/reconspider/archive/master.zip

Step 2 – Unzipping the file

Once you download, you will find zipped file name as datasploit-master.zip. Just right click on that zipped file and unzip the file using any software like WinZip, WinRAR.

Step 3 – Installing all dependencies.

After unzipping, go to that directory using Command Prompt and type the following command.

python setup.py install

Step 4 – Database

  • IP2Proxy Database

https://lite.ip2location.com/database/px8-ip-proxytype-country-region-city-isp-domain-usagetype-asn-lastseen

Download database, extract it and move to reconspider/plugins/ directory.

Also Read – Pagodo : Automate Google Hacking Database Scraping And Searching

Usage

ReconSpider is very handy tool and easy to use. All you have to do is just have to pass values to parameter. In order to start ReconSpider just type:

python reconspider.py

  • IP

This option gathers all the information of given IP Address from public resources.

ReconSpider >> 1
IP >> 8.8.8.8

  • DOMAIN

This option gathers all the information of given URL Address and check for vulneribility.

Reconspider >> 2
HOST (URL / IP) >> vulnweb.com
PORT >> 443

  • PHONENUMBER

This option allows you to gather information of given phonenumber.

Reconspider >> 3
PHONE NUMBER (919485247632) >>

  • DNS MAP

This option allows you to map an organizations attack surface with a virtual DNS Map of the DNS records associated with the target organization.

ReconSpider >> 4
DNS MAP (URL) >> vulnweb.com

  • METADATA

This option allows you to extract all metadat of the file.

Reconspider >> 5
Metadata (PATH) >> /root/Downloads/images.jpeg

  • REVERSE IMAGE SEARCH

This option allows you to obtain information and similar image that are available in internet.

Reconspider >> 6
REVERSE IMAGE SEARCH (PATH) >> /root/Downloads/images.jpeg
Open Search Result in web broser? (Y/N) : y

  • HONEYPOT

This option allows you to identify honeypots! The probability that an IP is a honeypot is captured in a “Honeyscore” value that can range from 0.0 to 1.0

ReconSpider >> 7
HONEYPOT (IP) >> 1.1.1.1

  • MAC ADDRESS LOOKUP

This option allows you to identify Mac address details who is manufacturer, address, country, etc.

Reconspider >> 8
MAC ADDRESS LOOKUP (Eg:08:00:69:02:01:FC) >>

  • IPHEATMAP

This option provided you heatmap of the provided ip or single ip, if connect all the provided ip location with accurate Coordinator.

Reconspider >> 9

1) Trace single IP
2) Trace multiple IPs

OPTIONS >>

  • TORRENT

This option allows you to gathers history of Torrent download history.

Reconspider >> 10
IPADDRESS (Eg:192.168.1.1) >>

  • USERNAME

This option allows you to gathers account information of the provided username from social media like Instagram, Twitter, Facebook.

Reconspider >> 11

1.Facebook
2.Twitter
3.Instagram

Username >>

  • IP2PROXY

This option allows you to identify whether IP address uses any kind of VPN / Proxy to hide his identify.

Reconspider >> 12
IPADDRESS (Eg:192.168.1.1) >>

  • MAIL BREACH

This option allows you to identify all breached mail ID from given domain.

Reconspider >> 13
DOMAIN (Eg:intercom.io) >>

  • UPDATE

This option allows you to check for updates. If a newer version will available, ReconSpider will download and merge the updates into the current directory without overwriting other files.

ReconSpider >> 99
Checking for updates..

  • EXIT

This option allows you to exit from ReconSpider Framework to your current Operating System’s terminal.

ReconSpider >> 0
Bye, See ya again..

R K

Recent Posts

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

1 week ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

2 weeks ago

Red Team Certification – A Comprehensive Guide To Advancing In Cybersecurity Operations

Embark on the journey of becoming a certified Red Team professional with our definitive guide.…

3 weeks ago

CVE-2024-5836 / CVE-2024-6778 : Chromium Sandbox Escape via Extension Exploits

This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…

3 weeks ago

Rust BOFs – Unlocking New Potentials In Cobalt Strike

This took me like 4 days (+2 days for an update), but I got it…

3 weeks ago

MaLDAPtive – Pioneering LDAP SearchFilter Parsing And Security Framework

MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…

3 weeks ago