Reconnaissance also known as Recon is the first step in any penetration testing , Bug hunting phase which means gathering information before any real attacks are planned. The Basic idea is to collect as much interesting information as possible about the target. Most of the time Recon phase can helps to the pen-testers to gather some sensitive data about target.Where on other hand OSINT known as Open Source Intelligence according to wikipedia is : Open-source intelligence is data collected from publicly available sources to be used in an intelligence context. In the intelligence community, the term “open” refers to overt, publicly available sources.

Table Of Content :

  • Introduction To Ashok
  • Installation Of Ashok
  • How To Use Ashok ?
  • Ashok Recon Examples
  • Contributions And Conclusion

Introduction To Ashok

Ashok is a Osint Reconnaissance Tool Designed by Ankitdobhal in python, a.k.a swiss knife for Reconnaissance , A tool for every beginner/pentester in their penetration testing tasks.It contains several features like : http-headers extractor, dns-lookup, whois-lookup, nslookup, subdomain-finder, nmap scanning, github,githubrecon, cms-detecter, linkextractor, banner-grabbing, subnet-lookup, geoip-lookup.

Installation Of Ashok

Reference :

Fire up on kali linux and navigate terminal on desktop. Ashok is very simple to install with the following steps ;

How To Use Ashok?

After the installation you can use this tool by using following command.

Http Headers Extractor

Subdomain Finder

Nmap Scan

Github Recon

About the Author
Ankit Dobhal Certified Ethical Hacker, information security analyst, penetration tester and researcher.Can be Contacted on Twitter and LinkedIn.

Leave a Reply

Your email address will not be published. Required fields are marked *