https://github.com/jas-/recon.sh
Find exploits about a target without ever touching the target
https://github.com/jas-/recon.sh
Last synced: about 2 months ago
JSON representation
Find exploits about a target without ever touching the target
- Host: GitHub
- URL: https://github.com/jas-/recon.sh
- Owner: jas-
- License: mit
- Created: 2021-08-17T17:50:57.000Z (almost 4 years ago)
- Default Branch: master
- Last Pushed: 2022-03-16T22:38:50.000Z (about 3 years ago)
- Last Synced: 2025-01-28T14:47:08.204Z (4 months ago)
- Language: Shell
- Size: 14.6 KB
- Stars: 0
- Watchers: 2
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: readme.md
- License: LICENSE
Awesome Lists containing this project
README
recon.sh
========
Find exploits about a target without ever touching the targetRequired
-------
* An internet connection; specifically egress tcp/443
* An API key from shodan.io; `shodan_api_key`
* An API key from vuldb.io; `vuldb_api_key`Configure
-------
Add your API keys to the `recon.sh` file under the `shodan_api_key` and `vuldb_api_key`
variables.Examples
-------
Available help system and arguments for tool.
```sh
recon.sh - Research targetsUsage ./recon.sh [options]
Options:
-c Cached time for datasources; 30 days
-r Use existing report
-t Targets; supports files, CSV or colon separated lists
-v Enable verbosity```
Default
-------
Default use case will find any publicly configured address(s) to find
exploits about. It does this by looking at local interfaces and if
only local addresses are found it queries an external API for the
address for the upstream router. When this is done all analysis is
applicable to the upstream comm device.```sh
$ ./recon.sh
Target: XXX.XXX.XXX.XXX
CVE(s): CVE-2006-6758,CVE-2010-2134,CVE-2013-4407
Exploit(s): https://www.exploit-db.com/exploits/11584 https://www.exploit-db.com/exploits/2974
```Custom target
-------
At times you may wish to find exploits for other systems. Using verbosity.```sh
$ ./recon.sh -vt
Info: Using as target(s)
Info: Found cached shodan data for ...
Info: Found cached shodan data for ...
Info: Using 2 report(s) to locate CPE data
Info: Found 8 CPE(s) to search for possible CVE data
Info: Found cached vuldb data for cpe:2.3:a:apache:http:server:2.4.6...
Info: Found cached vuldb data for cpe:a:apache:http:server:2.4.6...
Info: Found cached vuldb data for cpe:2.3:a:apache:http:server:2.4.6...
Info: Found cached vuldb data for cpe:2.3:a:openbsd:openssh:7.4...
Info: Found cached vuldb data for cpe:2.3:a:postfix:postfix...
Info: Found cached vuldb data for cpe:a:apache:http:server:2.4.6...
Info: Found cached vuldb data for cpe:a:openbsd:openssh:7.4...
Info: Found cached vuldb data for cpe:a:postfix:postfix...
Info: Using 8 report(s) to locate possible CVE data
Info: Found 7 CVE(s) applicable to
Info: Using ./assets/20210815-2459441 as CVE datasource
Info: Found 2 exploit(s) for ...
Target:
CVE(s): CVE-2006-6758,CVE-2010-2134,CVE-2013-4407
Exploit(s): https://www.exploit-db.com/exploits/11584 https://www.exploit-db.com/exploits/2974Info: Found 2 exploit(s) for ...
Target:
CVE(s): CVE-2006-6758,CVE-2010-2134,CVE-2013-4407
Exploit(s): https://www.exploit-db.com/exploits/11584 https://www.exploit-db.com/exploits/2974
```Existing report
-------
Historical data is available and can be replayed by specifying the
shodan.io report applicable.```sh
$ ./recon.sh -vr reports/shodan---
Target: XXX.XXX.XXX.XXX
CVE(s): CVE-2000-0470,CVE-2014-9222,CVE-2014-9223,CVE-2015-9222
Exploit(s): https://www.exploit-db.com/exploits/39739
```Caveats
-------
1. This tool is far from perfect due in part to it's reliance on
data provided from external API(s). Be aware of false positives and
the possibility that the target(s) may not have existing scan data
to work with.2. The tool makes all attempts to retain and limit requests to the
API's necessary for reconnasance. The curent cached report time is
`30` days.3. The tool ONLY displays those CVE(s) that have existing exploits
for the service associated with the target. So if a system has a
known CVE and NOT an existing exploit available from exploit-db.com
nothing will be presented when there very well could be exising CVE(s)
available.API(s) used
-------
Here is a list of the remote API's used by this tool:
* https://ifconfig.me
* https://api.shodan.io
* https://vuldb.com
* https://www.exploit-db.com
* https://cve.mitre.orgDisclaimer
-------
This tool provides the user with resources on both existing
vulnerabiliites and where available, existing POC tools to help
facilite the compromise of a system. Using this tool responsibly
will ensure you do not violate or end up prosecuted under the
Computer Fraud and Abuse Act 18 U.S.C. § 1030