Sponsored
Exploiting Tools

Ashok : Osint Recon Tool For Hackers

Reconnaissance also known as Recon is the first step in any penetration testing , Bug hunting phase which means gathering information before any real attacks are planned. The Basic idea is to collect as much interesting information as possible about the target. Most of the time Recon phase can helps to the pen-testers to gather some sensitive data about target.Where on other hand OSINT known as Open Source Intelligence according to wikipedia is : Open-source intelligence is data collected from publicly available sources to be used in an intelligence context. In the intelligence community, the term “open” refers to overt, publicly available sources.

Table Of Content :

  • Introduction To Ashok
  • Installation Of Ashok
  • How To Use Ashok ?
  • Ashok Recon Examples
  • Contributions And Conclusion

Introduction To Ashok

Ashok is a Osint Reconnaissance Tool Designed by Ankitdobhal in python, a.k.a swiss knife for Reconnaissance , A tool for every beginner/pentester in their penetration testing tasks.It contains several features like : http-headers extractor, dns-lookup, whois-lookup, nslookup, subdomain-finder, nmap scanning, github,githubrecon, cms-detecter, linkextractor, banner-grabbing, subnet-lookup, geoip-lookup.

Installation Of Ashok

Reference : https://github.com/ankitdobhal/Ashok

Fire up on kali linux and navigate terminal on desktop. Ashok is very simple to install with the following steps ;

git clone https://github.com/ankitdobhal/Ashok
cd Ashok
pip3 install -r requirements.txt

How To Use Ashok?

After the installation you can use this tool by using following command.

python3 Ashok.py -h

Http Headers Extractor

python3 Ashok.py --headers https://hackthebox.eu

Subdomain Finder

python3 Ashok.py --subdomain hackthebox.eu

Nmap Scan

python3 Ashok.py --nmap hackthebox.eu

Github Recon

python3 Ashok.py --username BaseMax
About the Author
Ankit Dobhal Certified Ethical Hacker, information security analyst, penetration tester and researcher.Can be Contacted on Twitter and LinkedIn.
Sponsored

Recent Posts

Gau (GetAllUrls) – Find Known and Hidden URL

The gau (Get All URLs) tool is a versatile open-source utility that collects URLs from…

3 months ago

Jsluicepp – Burp Extension for JS Secrets – BugBountyTip

Jsluice++ is a Burp Suite extension designed for passive and active scanning of JavaScript traffic…

8 months ago

Bypassing Firewalls (WAF) with XSS Payloads

Hey Folks :) !! In this tutorial, we will describe some of the techniques commonly…

8 months ago

Termux Cheat Sheet for Hackers

Hey Folks :) !! In this article, we present the "Termux Cheat Sheet for Hackers"…

1 year ago

Cracking the X-Factor in Cybersecurity: How Humans are Protecting the Systems?

Amid the rapid advancement of technology, the significance of human involvement in cybersecurity frequently goes…

2 years ago

Cariddi – Hidden Endpoint Finder for Bug Hunting

Hey Folks, we are back today after such a long break, but don't worry we…

3 years ago
Sponsored

This website uses cookies.