Sponsored
Information Gathering

InfoSploit – Information Gathering Tool

Hey Folks, in this article we will discuss on an very lightweight information gathering tool as it can easily install and run called “InfoSploit”. The InfoSploit tool is also available for linux, window and android phones ( termux ) that is coded in both bash and python languages.

Let’s take a look 😛 !!

Installation

First of all we will download this tool from github by using the git command. After downloading is done then we will go to directory of this tool and execute the bash command in order to install this tool completely. If you have installed all the requirements then this tool will be installed soon, otherwise it will take some time. But after installing it will give us the command to boot this tool directly from anywhere.

git clone https://github.com/CybernetiX-S3C/InfoSploit
cd InfoSploit/
bash install
Infosploit

Features

Now you can see all the available special features in the tool, through which we can have good footprint against any target.

DNS lookup

We can control this tool numerically as you can see in the image below. After selecting the first option, it dumps all DNS records of the target web application.

Open Services

Similarly, by selecting the fifth option we can get all the details of open and running services on the target web server.

Crawling

Crawling is the best way to find sensitive locations available on the target web application.

Subdomain Finding

As you can see in the image below how easily all subdomains have been identified.

Nice 😛 !! Not only this, because in this tool we get lots of options as you can see in the image below which you can use one by one yourself.

About the Author
Shubham Goyal Certified Ethical Hacker, information security analyst, penetration tester and researcher. Can be Contact on Linkedin.
Sponsored

Recent Posts

Termux Cheat Sheet for Hackers

Hey Folks :) !! In this article, we present the "Termux Cheat Sheet for Hackers"…

1 month ago

Cracking the X-Factor in Cybersecurity: How Humans are Protecting the Systems?

Amid the rapid advancement of technology, the significance of human involvement in cybersecurity frequently goes…

8 months ago

Cariddi – Hidden Endpoint Finder for Bug Hunting

Hey Folks, we are back today after such a long break, but don't worry we…

2 years ago

API Security Testing 101: Know Everything About API Security Testing!

The security of your API should be one of the top priorities of companies. Without…

2 years ago

7 Best Tools for Web Penetration Testing: Comprehensive Details

Hey Folks, In today's business world, it is essential to have an online presence. However,…

2 years ago

Cyber Security Audits: Everything You Need to Know About It

Hey Folks, Is your business prepared in case of a cyber attack? Many companies don't…

2 years ago
Sponsored

This website uses cookies.