Reconnaissance also known as Recon is the first step in any penetration testing , Bug hunting phase which means gathering information before any real attacks are planned. The Basic idea is to collect as much interesting information as possible about the target. Most of the time Recon phase can helps to the pen-testers to gather some sensitive data about target.Where on other hand OSINT known as Open Source Intelligence according to wikipedia is : Open-source intelligence is data collected from publicly available sources to be used in an intelligence context. In the intelligence community, the term “open” refers to overt, publicly available sources.
Table Of Content :
- Introduction To Ashok
- Installation Of Ashok
- How To Use Ashok ?
- Ashok Recon Examples
- Contributions And Conclusion
Introduction To Ashok
Ashok is a Osint Reconnaissance Tool Designed by Ankitdobhal in python, a.k.a swiss knife for Reconnaissance , A tool for every beginner/pentester in their penetration testing tasks.It contains several features like : http-headers extractor, dns-lookup, whois-lookup, nslookup, subdomain-finder, nmap scanning, github,githubrecon, cms-detecter, linkextractor, banner-grabbing, subnet-lookup, geoip-lookup.
Installation Of Ashok
Reference : https://github.com/ankitdobhal/Ashok
Fire up on kali linux and navigate terminal on desktop. Ashok is very simple to install with the following steps ;
git clone https://github.com/ankitdobhal/Ashok
pip3 install -r requirements.txt
How To Use Ashok?
After the installation you can use this tool by using following command.
python3 Ashok.py -h
Http Headers Extractor
python3 Ashok.py --headers https://hackthebox.eu
python3 Ashok.py --subdomain hackthebox.eu
python3 Ashok.py --nmap hackthebox.eu
python3 Ashok.py --username BaseMax
A keen learner and passionate IT student. He has done Web designing, CCNA, RedHat, Ethical hacking, Network & web penetration testing. Currently, he is completing his graduation and learning about Red teaming, CTF challenges & Blue teaming.