Sponsored
Exploiting Tools

RED_HAWK : Tool for Information Gathering

Hey Folks, in this tutorial we will discuss on an interesting tool called “REDHAWK“. It’s an all in one tool for information gathering and vulnerability scanning. The tool uses multiple combinations of other third party tools as well as currently is able to detect the following CMSs (Content Management Systems).

List of CMS Supported

  • WordPress
  • Joomla
  • Drupal
  • Magento

Let’s take a look 🙂 !!

Installation

Now first of all we will download this project using git command from gitub and after cloning the repository then we will go to the directory of this tool.
Note : make sure you should have php module to execute this tool.

git clone https://github.com/Tuhinshubhra/RED_HAWK
cd RED_HAWK

Done 🙂 !! The configuration is complete and now we can use this tool using the following command. Now we have entered our target details and protocol related details on which the website is running. Basically if the target website is running on HTTP protocol then you have to enter “1” otherwise “2″.

php rhawk.php

Great 🙂 !! As you can see it has dumped some useful information related to the target website such as webserver, IP address, cms, cloudflare etc.

DNS Lookup

If you want to collect information related to the DNS server of the target website then you can use option “4”.

Calculate Subnet Mask

Similarly by using the “5” option of this tool we can calculate the subnet mask of this target web application.

Open Port Scanning

Often developers forget to add security to the active service running on the server, allowing the attacker to exploit those loopholes and remotely acquire the entire web server. So we use the following tools to find available or open ports on target web server.

Subdomain Finding

In addition, we can retrieve subdomain details through a particular host.

Basic Scanning

Now we will choose option “11” to perform a basic scan against the target web server.

Done 🙂 !! As you can see for yourself what kind of details we get after using the basic scan feature of this tool.

About the Author
Shubham Goyal Certified Ethical Hacker, information security analyst, penetration tester and researcher. Can be Contact on Linkedin.
Sponsored

View Comments

  • Hello, I think your blog might be having browser compatibility issues. When I look at your blog in Opera, it looks fine but when opening in Internet Explorer, it has some overlapping. I just wanted to give you a quick heads up! Other then that, very good blog!

  • you're truly a good webmaster. The web site loading velocity is amazing. It seems that you're doing any distinctive trick. Furthermore, The contents are masterwork. you've performed a great process in this topic!

Recent Posts

Termux Cheat Sheet for Hackers

Hey Folks :) !! In this article, we present the "Termux Cheat Sheet for Hackers"…

1 month ago

Cracking the X-Factor in Cybersecurity: How Humans are Protecting the Systems?

Amid the rapid advancement of technology, the significance of human involvement in cybersecurity frequently goes…

8 months ago

Cariddi – Hidden Endpoint Finder for Bug Hunting

Hey Folks, we are back today after such a long break, but don't worry we…

2 years ago

API Security Testing 101: Know Everything About API Security Testing!

The security of your API should be one of the top priorities of companies. Without…

2 years ago

7 Best Tools for Web Penetration Testing: Comprehensive Details

Hey Folks, In today's business world, it is essential to have an online presence. However,…

2 years ago

Cyber Security Audits: Everything You Need to Know About It

Hey Folks, Is your business prepared in case of a cyber attack? Many companies don't…

2 years ago
Sponsored

This website uses cookies.