Recon Tool: FinalRecon

by | Jul 19, 2024 | Tools

Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon

Reading Time: 3 Minutes

FinalRecon

FinalRecon developed by thewhiteh4t, is an all in one automatic web reconnaissance tool written in python. The goal of this tool is to provide an overview of the target in a short amount of time while maintaining the accuracy of results. Instead of executing several tools one after another it can provide similar results keeping dependencies small and simple.

See Also: So you want to be a hacker?
Offensive Security and Ethical Hacking Course

Features

FinalRecon provides detailed information such as :

  • Header Information
  • Whois
  • SSL Certificate Information
  •  Crawler

                ○ html
                      ▪️ CSS
                      ▪️ Javascripts
                      ▪️ Internal Links
                      ▪️ External Links
                      ▪️ Images

              ○ robots
              ○ sitemaps
              ○ Links inside Javascripts
              ○ Links from Wayback Machine from Last 1 Year

  • DNS Enumeration

            ○ Over 40 types of Records are queried
            ○ DMARC Records

  • Subdomain Enumeration

            ○ Over 10 reliable data sources

  • Directory Enumeration

            ○ Support for File Extensions

  • Wayback Machine

           ○ URLs from Last 5 Years

  • Port Scan

          ○ Fast
          ○ Top 1000 Ports

  • Export

          ○ Formats

                ▪️ txt
                ▪️ json [Coming Soon]

 

Configuration

 

API Keys

Some Modules Use API Keys to fetch data from different resources, these are optional, if you are not using an API key, they will be simply skipped.

 

Environment Variables

Keys are read from environment variables if they are set otherwise they are loaded from the config directory.

Saved Keys

You can use -k to add the keys which will be saved in config directory automatically

Path = $HOME/.config/finalrecon/keys.json

SourceModuleLink
FacebookSub Domain Enumhttps://developers.facebook.com/docs/facebook-login/access-tokens
VirusTotalSub Domain Enumhttps://www.virustotal.com/gui/my-apikey
ShodanSub Domain Enumhttps://developer.shodan.io/api/requirements
BeVigilSub Domain Enumhttps://bevigil.com/osint-api
BinaryEdgeSub Domain Enumhttps://app.binaryedge.io/
NetlasSub Domain Enumhttps://docs.netlas.io/getting_started/
ZoomEyeSub Domain Enumhttps://www.zoomeye.hk/
HunterSub Domain Enumhttps://hunter.how/search-api

 

JSON Config File

Default config file is available at ~/.config/finalrecon/config.json

 

Tested on

  • Kali Linux
  • BlackArch Linux

FinalRecon is a tool for Pentesters and it’s designed for Linux based Operating Systems, other platforms like Windows and Termux are NOT supported.

Installation

Kali Linux

sudo apt install finalrecon

 

BlackArch Linux

sudo pacman -S finalrecon

 

SecBSD

doas pkg_add finalrecon

 

Other Linux

git clone https://github.com/thewhiteh4t/FinalRecon.git

cd FinalRecon

pip3 install -r requirements.txt

 

Docker

docker pull thewhiteh4t/finalrecon

docker run -it --entrypoint /bin/sh thewhiteh4t/finalrecon

Also docker user can use this alias to run the finalrecon as the normal CLI user.

alias finalrecon="docker run -it --rm --name finalrecon --entrypoint 'python3' thewhiteh4t/finalrecon finalrecon.py"

And then use finalrecon to start your scan.

remark

If you have any api keys you can easily commit that image in your local machine.

This docker usage needs root to run docker command.

Usage

 

Clone the repo from here: GitHub Link

Merch

Recent Tools

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This