Offensive Security Tool for Reconnaissance and Information Gathering.

Features
  • DNS details
  • DNS visual mapping using DNS dumpster
  • WHOIS information
  • TLS Data - supported ciphers, TLS versions, certificate details, and SANs
  • Port Scan
  • Services and scripts scan
  • URL fuzzing and dir/file detection
  • Subdomain enumeration - uses Google Dorking, DNS dumpster queries, SAN discovery, and brute-force
  • Web application data retrieval:
    • CMS detection
    • Web server info and X-Powered-By
    • robots.txt and sitemap extraction
    • Cookie inspection
    • Extracts all fuzzable URLs
    • Discovers HTML forms
    • Retrieves all Email addresses
  • Detects known WAFs
  • Supports anonymous routing through Tor/Proxies
  • Uses asyncio for improved performance
  • Saves output to files - separates targets by folders and modules by files

Roadmap and TODOs
  • Support multiple hosts (read from the file)
  • Rate limit evasion
  • OWASP vulnerabilities scan (RFI, RCE, XSS, SQLi etc.)
  • SearchSploit lookup on results
  • IP ranges support
  • CIDR notation support
  • More output formats

About
A raccoon is a tool made for reconnaissance and information gathering with an emphasis on simplicity.
It will do everything from fetching DNS records, retrieving WHOIS information, obtaining TLS data, detecting WAF presence and up to threaded dir busting and subdomain enumeration. Every scan outputs to a corresponding file.
As most of Raccoon's scans are independent and do not rely on each other's results, it utilizes Python's asyncio to run most scans asynchronously.
Raccoon supports Tor/proxy for anonymous routing. It uses default wordlists (for URL fuzzing and subdomain discovery) from the amazing SecLists repository but different lists can be passed as arguments.
For more options - see "Usage".

Installation
For the latest stable version:
pip install raccoon-scanner
Or clone the GitHub repository for the latest features and changes:
git clone https://github.com/evyatarmeged/Raccoon.git
cd Raccoon
python raccoon_src/main.py

Prerequisites
Raccoon uses Nmap to scan ports as well as utilizes some other Nmap scripts and features. It is mandatory that you have it installed before running Raccoon.
OpenSSL is also used for TLS/SSL scans and should be installed as well.

Usage
Usage: raccoon [OPTIONS]

Options:
--version Show the version and exit.
-t, --target TEXT Target to scan [required]
-d, --dns-records TEXT Comma separated DNS records to query.
Defaults to: A,MX,NS,CNAME,SOA,TXT
--tor-routing Route HTTP traffic through Tor (uses port
9050). Slows total runtime significantly
--proxy-list TEXT Path to proxy list file that would be used
for routing HTTP traffic. A proxy from the
list will be chosen at random for each
request. Slows total runtime
--proxy TEXT Proxy address to route HTTP traffic through.
Slows total runtime
-w, --wordlist TEXT Path to wordlist that would be used for URL
fuzzing
-T, --threads INTEGER Number of threads to use for URL
Fuzzing/Subdomain enumeration. Default: 25
--ignored-response-codes TEXT Comma separated list of HTTP status code to
ignore for fuzzing. Defaults to:
302,400,401,402,403,404,503,504
--subdomain-list TEXT Path to subdomain list file that would be
used for enumeration
-S, --scripts Run Nmap scan with -sC flag
-s, --services Run Nmap scan with -sV flag
-f, --full-scan Run Nmap scan with both -sV and -sC
-p, --port TEXT Use this port range for Nmap scan instead of
the default
--tls-port INTEGER Use this port for TLS queries. Default: 443
--skip-health-check Do not test for target host availability
-fr, --follow-redirects Follow redirects when fuzzing. Default: True
--no-url-fuzzing Do not fuzz URLs
--no-sub-enum Do not bruteforce subdomains
-q, --quiet Do not output to stdout
-o, --outdir TEXT Directory destination for scan output
--help Show this message and exit.

Screenshots

HTB challenge example scan:




Results folder tree after a scan:



Related word
  1. Computer Hacker
  2. Hacker Tools 2019
  3. Ethical Hacker Tools
  4. Hacking Tools For Games
  5. Hacking Tools Download
  6. Hacking App
  7. Hacker Tools List
  8. Hack Website Online Tool
  9. Hacker Tools For Windows
  10. Hacking Tools For Windows
  11. Tools 4 Hack
  12. Pentest Tools Url Fuzzer
  13. Pentest Tools Review
  14. Hacker Tools
  15. Pentest Tools Apk
  16. Hacking Tools For Games
  17. Pentest Tools Linux
  18. Hacking Tools For Mac
  19. Install Pentest Tools Ubuntu
  20. Hacking Tools For Games
  21. Android Hack Tools Github
  22. Usb Pentest Tools
  23. Pentest Tools Tcp Port Scanner
  24. Usb Pentest Tools
  25. Hacks And Tools
  26. Hacker Tools 2020
  27. Hacker Tools Github
  28. Hacking Tools For Kali Linux
  29. Hacking App
  30. Hacker Tools
  31. Hak5 Tools
  32. Hack Tools 2019
  33. Hak5 Tools
  34. Hacker Tool Kit
  35. Nsa Hack Tools
  36. Hacker Tools List
  37. Install Pentest Tools Ubuntu
  38. What Is Hacking Tools
  39. Hack Tools Download
  40. Growth Hacker Tools
  41. Kik Hack Tools
  42. Hacking Apps
  43. What Are Hacking Tools
  44. What Are Hacking Tools
  45. Hacking Tools For Beginners
  46. Hacking Tools Download
  47. Pentest Tools Review
  48. Hacker Techniques Tools And Incident Handling
  49. Blackhat Hacker Tools
  50. Hacker Tools Online
  51. Hacker Tools Mac
  52. New Hacker Tools
  53. New Hacker Tools
  54. Hack And Tools
  55. Pentest Tools Website
  56. Pentest Tools Website Vulnerability
  57. Pentest Tools Port Scanner
  58. Hack Tools
  59. Pentest Recon Tools
  60. Tools Used For Hacking
  61. Pentest Automation Tools
  62. Pentest Tools Alternative
  63. Install Pentest Tools Ubuntu
  64. Hacker Hardware Tools
  65. Hack Tool Apk No Root
  66. Computer Hacker
  67. Hack Tools
  68. Pentest Reporting Tools
  69. Hacking Tools Download
  70. Physical Pentest Tools
  71. Nsa Hacker Tools
  72. Hacker Tools 2019
  73. Pentest Tools For Ubuntu
  74. Pentest Tools Kali Linux
  75. Hackers Toolbox
  76. Pentest Tools For Windows
  77. Bluetooth Hacking Tools Kali
  78. Hacker Tools For Ios
  79. Hacks And Tools
  80. Kik Hack Tools
  81. Pentest Tools Website Vulnerability
  82. Pentest Tools Windows
  83. Hacking Tools Name
  84. Pentest Tools Kali Linux
  85. Pentest Tools Website
  86. Hacker Tools Online
  87. Hack App
  88. Nsa Hacker Tools
  89. Hacking Tools Windows 10
  90. Hack Tools For Windows
  91. Nsa Hack Tools

0 comments:

Post a Comment