• Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office
AnonyViet - English Version
  • Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office
No Result
View All Result
  • Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office
No Result
View All Result
AnonyViet - English Version
No Result
View All Result

How to use reconFTW to Spy on the network for security holes

AnonyViet by AnonyViet
January 25, 2023
in Security
0

I was assigned the task of finding vulnerabilities in the Website. Before you need to do network scouting/network scouting, the term is called Recon. If used manually, it is quite time consuming, today I will introduce you to Tool reconFTW to help you scout your friends very well, integrated with many functions to help collect accurate information about the Website you are scanning.

Join the channel Telegram of the AnonyViet 👉 Link 👈

What is a website security vulnerability?

Website security vulnerabilities are weaknesses in the design and configuration of the system, web developer error or negligence in the operation of the website. The existence of these vulnerabilities is a danger to developers as well as website visitors when black hat hackers can fully exploit them to be able to steal your data or information. your personal information, the user’s and more

Website Security Vulnerability

Hackers use scanning tools to detect a wide range of websites with poor security configuration or websites on popular platforms like WordPress that have published vulnerabilities that have not been addressed by the website owner or web developer, and They will use them to attack, install malicious code and destroy websites.

Some studies show that in 2019, every 45 minutes, a website will be “visited” by hackers and mainly black hat hackers. This is enough to talk about how dangerous the existence of security holes is.

Common types of website security vulnerabilities

WordPress Security Vulnerability

  • SQL Injection (you can see more articles use SQLmap For more details)
  • Broken Authentication
  • Cross Site Scripting
  • Server-Side Template Injection
  • Insecure Direct Object References

reconFTW is a software from the github community and authored by six2dez. This is a network reconnaissance tool, also known as a network spy, and it can collect information of the website such as the owner, the domain name is associated with but most importantly, this tool is capable of automating the process. Check your website’s security, list all subdomains, and do a comprehensive vulnerability check. reconFTW uses a variety of methods to test including:

  • passive
  • bruteforce
  • permutations
  • certificate transparency
  • source code scraping
  • analytics
  • DNS records

It also performs various vulnerability checks like XSS, Open Redirects, SSRF, CRLF, LFI, SQLi, SSL check, SSTI,DNS, etc. Along with that, reconFTW can OSINT (trace tracing) and scan target’s port.

To say, compared to tools like Burpsuite, in terms of features, they are not inferior to them but also can run the tool simply and easily. After experiencing, this is an extremely suitable tool for those of you who cannot use tools like nmap or Burpsuite.

At the same time, after the whole detective process has been completed, all that has been collected will be aggregated into a single file and it is quite convenient if you want to reopen it to check and check for possible errors. available on the website.

It takes a long time to run the entire network reconnaissance feature, but I just need to sit and eat because the whole process has been automated and optimized so that the user can easily. collect information

Note before doing

It is strictly forbidden to take advantage of the security holes of non-proprietary websites to wreak havoc. Anonyviet will not be responsible for any of your actions. Please continue if you already agree with this note!

Instructions for using reconFTW to scan website security holes

Installation Instructions

You can visit the official tool’s github link here

For live installation / using virtual machine / using VPS

git clone https://github.com/six2dez/reconftw
cd reconftw/
./install.sh

#khởi động tool
./reconftw.sh -d [tên miền] -r

For Docker

Method 1: From DockerHub

docker pull six2dez/reconftw:main
wget https://raw.githubusercontent.com/six2dez/reconftw/main/reconftw.cfg
mkdir Recon

#câu lệnh khời động tool
docker run -d -v $PWD/reconftw.cfg:/root/Tools/reconftw/reconftw.cfg -v $PWD/Recon/:/root/Tools/reconftw/Recon/ --name reconftwSCAN --rm six2dez/reconftw:main -d [tên miền] -r

Method 2: from Github

git clone https://github.com/six2dez/reconftw
cd reconftw
docker build -t reconftw Docker/.

#câu lệnh khởi động tool
docker run -v $PWD/reconftw.cfg:/root/Tools/reconftw/reconftw.cfg -v $PWD/Recon/:/root/Tools/reconftw/Recon/ --name reconftwSCAN --rm reconftw -d [tên miền] -r

User manual

Syntax: ./reconftw.sh [tùy chọn dành cho mục tiêu] [Input cho mục tiêu] [chế độ(mode)] [các tùy chọn khác]

For option for target

Here:

Target.com is the domain you want to attack

-r: I will explain in the mode (mode)

  • -d: for 1 domain name
    For example: ./reconftw.sh -d target.com -r
  • -l: use a list of domains
    For example: ./reconftw.sh -l targets.txt -r
  • -m: for 1 target but multiple domains
    For example:./reconftw.sh -m target -l domains.txt -r
  • -i: add subdomains as list
    For example:./reconftw.sh -d target.com -i in.txt -r
  • -x: exclude subdomains
    For example: ./reconftw.sh -d target.com -x oos.txt -r

For modes

Usually, I recommend using -r over the others because I only use that. If you want full scan, use -a

Note: processing speed depends on the mode you choose and the speed of your home network. Sometimes with large web it will take quite a while.

  • -r: Website scouting with all modes (no attack)
    For example: ./reconftw.sh -d target.com -r
  • -S: Search Subdomains
    For example: ./reconftw.sh -d target.com -s
  • -p: Only run as passive
    For example: ./reconftw.sh -d target.com -p
  • -w: Check the website provided in the list
    For example: ./reconftw.sh -l targetlist.txt -w
  • -a: Run all functions
    For example: ./reconftw.sh -d target.com -a
  • -n: osint – tracing
    For example: ./reconftw.sh -d target.com -n
  • -H: show help
    For example: ./reconftw.sh -h

For other options

  • –deep: Run deep scan
  • -v: VPS – use when you run on VPS
  • -f conf_file: use another config (not recommended)
  • -o: Save output of reconFTW

Some examples of usage

  • Run web snooping with a unique domain name: ./reconftw.sh -d target.com -r
  • Run web scouting with a list of domains: ./reconftw.sh -l sites.txt -r -o /output/directory/
  • Run web scouting with a list of domains on vps: ./reconftw.sh -d target.com -r --deep -o /output/directory/
  • Run web snooping with multiple domains from 1 company: ./reconftw.sh -m company -l domains_list.txt -r
  • Boot into Full power mode: ./reconftw.sh -d target.com -a

Eg:

How to use reconFTW to scan website security holes

Actual Demo

First, I run the following command: ./reconftw.sh -d duocphamviethung.com.vn -r

run reconFTW

After it finishes scanning, it returns the results. There is a statistics of the time it takes to scan and complete the task. Currently, it has taken me up to 2 hours for a small website, so please note the time!

At the end of the scan

All files are saved in folder Recon/[tên website tấn công] if you don’t set its output. Output files

Here, the file that you need to pay attention to is the nuclei_output file because this file will return a CVE error code that hackers can use to exploit information. You can go to Google and search for the error code to find the solution to fix it as soon as possible!

File contains error code CVE

CVE error codes after scanning is complete

Use it to pentest your system only!

The article achieved: 5/5 – (100 votes)

Tags: holesnetworkreconFTWsecuritySpy
Previous Post

Top 4 Best Free Web Programming Websites in 2022

Next Post

Lesson 242: Trendlines in Excel

AnonyViet

AnonyViet

Related Posts

How to implement Shellcode Injection attack technique with Autoit
Security

How to implement Shellcode Injection attack technique with Autoit

March 14, 2025
How to exploit the holy hole of Hijacking on Windows
Security

How to exploit the holy hole of Hijacking on Windows

March 8, 2025
Hamamal: Shellcode execution technique from afar to overcome Antivirus's discovery
Security

Hamamal: Shellcode execution technique from afar to overcome Antivirus's discovery

February 10, 2025
Snov.io Email Finder: Search emails with only company name/domain name/LinkedIn profile
Security

Snov.io Email Finder: Search emails with only company name/domain name/LinkedIn profile

December 14, 2024
Capsolver: Automatic solution solution for business
Security

Capsolver: Automatic solution solution for business

December 12, 2024
Seekr: Collect & manage OSINT data
Security

Seekr: Collect & manage OSINT data

November 22, 2024
Next Post
Lesson 242: Trendlines in Excel

Lesson 242: Trendlines in Excel

0 0 votes
Article Rating
Subscribe
Login
Notify of
guest

guest

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments

Recent News

Guide to comment on the constitution amendment on VNEID

Guide to comment on the constitution amendment on VNEID

May 21, 2025
Tips to fix the file is open in another program

Tips to fix the file is open in another program

May 21, 2025
7 ways to release RAM to accelerate your Windows computer

7 ways to release RAM to accelerate your Windows computer

May 21, 2025
Discover Supermix – Smart playlist on YouTube Music

Discover Supermix – Smart playlist on YouTube Music

May 20, 2025
Guide to comment on the constitution amendment on VNEID

Guide to comment on the constitution amendment on VNEID

May 21, 2025
Tips to fix the file is open in another program

Tips to fix the file is open in another program

May 21, 2025
7 ways to release RAM to accelerate your Windows computer

7 ways to release RAM to accelerate your Windows computer

May 21, 2025
AnonyViet - English Version

AnonyViet

AnonyViet is a website share knowledge that you have never learned in school!

We are ready to welcome your comments, as well as your articles sent to AnonyViet.

Follow Us

Contact:

Email: anonyviet.com[@]gmail.com

Main Website: https://anonyviet.com

Recent News

Guide to comment on the constitution amendment on VNEID

Guide to comment on the constitution amendment on VNEID

May 21, 2025
Tips to fix the file is open in another program

Tips to fix the file is open in another program

May 21, 2025
  • Home
  • Home 2
  • Home 3
  • Home 4
  • Home 5
  • Home 6
  • Next Dest Page
  • Sample Page

©2024 AnonyVietFor Knowledge kqxs hôm nay xem phim miễn phí SHBET bongdaso

wpDiscuz
0
0
Would love your thoughts, please comment.x
()
x
| Reply
No Result
View All Result
  • Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office

©2024 AnonyVietFor Knowledge kqxs hôm nay xem phim miễn phí SHBET bongdaso