Sponsored
Exploiting Tools

Ashok : Osint Recon Tool For Hackers

Reconnaissance also known as Recon is the first step in any penetration testing , Bug hunting phase which means gathering information before any real attacks are planned. The Basic idea is to collect as much interesting information as possible about the target. Most of the time Recon phase can helps to the pen-testers to gather some sensitive data about target.Where on other hand OSINT known as Open Source Intelligence according to wikipedia is : Open-source intelligence is data collected from publicly available sources to be used in an intelligence context. In the intelligence community, the term “open” refers to overt, publicly available sources.

Table Of Content :

  • Introduction To Ashok
  • Installation Of Ashok
  • How To Use Ashok ?
  • Ashok Recon Examples
  • Contributions And Conclusion

Introduction To Ashok

Ashok is a Osint Reconnaissance Tool Designed by Ankitdobhal in python, a.k.a swiss knife for Reconnaissance , A tool for every beginner/pentester in their penetration testing tasks.It contains several features like : http-headers extractor, dns-lookup, whois-lookup, nslookup, subdomain-finder, nmap scanning, github,githubrecon, cms-detecter, linkextractor, banner-grabbing, subnet-lookup, geoip-lookup.

Installation Of Ashok

Reference : https://github.com/ankitdobhal/Ashok

Fire up on kali linux and navigate terminal on desktop. Ashok is very simple to install with the following steps ;

git clone https://github.com/ankitdobhal/Ashok
cd Ashok
pip3 install -r requirements.txt

How To Use Ashok?

After the installation you can use this tool by using following command.

python3 Ashok.py -h

Http Headers Extractor

python3 Ashok.py --headers https://hackthebox.eu

Subdomain Finder

python3 Ashok.py --subdomain hackthebox.eu

Nmap Scan

python3 Ashok.py --nmap hackthebox.eu

Github Recon

python3 Ashok.py --username BaseMax
About the Author
Ankit Dobhal Certified Ethical Hacker, information security analyst, penetration tester and researcher.Can be Contacted on Twitter and LinkedIn.
Sponsored

Recent Posts

Termux Cheat Sheet for Hackers

Hey Folks :) !! In this article, we present the "Termux Cheat Sheet for Hackers"…

1 month ago

Cracking the X-Factor in Cybersecurity: How Humans are Protecting the Systems?

Amid the rapid advancement of technology, the significance of human involvement in cybersecurity frequently goes…

8 months ago

Cariddi – Hidden Endpoint Finder for Bug Hunting

Hey Folks, we are back today after such a long break, but don't worry we…

2 years ago

API Security Testing 101: Know Everything About API Security Testing!

The security of your API should be one of the top priorities of companies. Without…

2 years ago

7 Best Tools for Web Penetration Testing: Comprehensive Details

Hey Folks, In today's business world, it is essential to have an online presence. However,…

2 years ago

Cyber Security Audits: Everything You Need to Know About It

Hey Folks, Is your business prepared in case of a cyber attack? Many companies don't…

2 years ago
Sponsored

This website uses cookies.