Skip to main content
GADGETS   COMPILER>



FinalRecon -- All-in-One Web Recon Toolkit

  FinalRecon is a web recon toolkit to scan websites for penetration testing. It is made by TheWhiteh4t. This Python3 toolkit is simple and fast. FinalRecon is a well maintained tool and they update and add new features regularly.



FinalRecon

The key features of this tool is following:
  • Header Information
  • Whois
  • SSL Certificate Information
  • Crawler
    • HTML
      • CSS
      • Javascripts
      • Internal Links
      • External Links
      • Images
    • robots
    • sitemaps
    • Links inside Javascripts
    • Links from Wayback Machine from Last 1 Year
  • DNS Enumeration
    • A, AAAA, ANY, CNAME, MX, NS, SOA, TXT Records
    • DMARC Records
  • Subdomain Enumeration
    • Data Sources
      • Buffer Overflow
      • crt.sh
      • ThreatCrowd
      • AnubisDB
      • ThreatMiner
      • Facebook Certificate Transparency API
  • Traceroute
    • Protocols
      • UDP
      • TCP
      • ICMP
  • Directory Searching
    • Support for File Extensions
    • Directories from Wayback Machine from Last 1 Year
  • Port Scan
    • Fast
    • Top 1000 Ports
    • Open Ports with Standard Services
  • Export Results
    • Formats
      • txt
      • xml
      • csv
Lets start our installation process in Kali Linux machine. FinalRecon comes pre-installed in Kali Linux 2020.4 update or we can install it from it's GitHub repository. To install it from GitHub repository first we need to open terminal in our Kali Linux and type following command to clone it from it's GitHub repository:

git clone https://github.com/thewhiteh4t/finalrecon

The screenshot of the command is following:

cloning FinalRecon from GitHub

After cloning process is done we need to go in the finalrecon directory by using cd command:

cd finalrecon

Then we install the required packages to use this tool by using following command:

sudo pip3 install -r requirements.txt
The screenshot of this command is following:

installing requirements for FinalRecon

After installing the required packages we are ready to run this tool on a targeted website.

Lets run FinalRecon to check its help options by applying following command:

sudo python3 finalrecon.py -h

Then its help screen will comes in front of us as shown in following screenshot:

options in FinalRecon

Now we run FinalRecon and do a full scan on google for an example by using following command:

sudo python3 finalrecon.py --full https://google.com
Then it starts the scanning process and try to find information on targeted website as shown in following screenshot:

scanning websites using FinalRecon

We also can save our scan results by using the -o flag. For an example we save this in txt format, but we can use xml and csv format also.

sudo python3 finalrecon.py --full https://google.com -o txt

This toolkit can scan for sensitive files in web directories which may contain more information about the target.

There are lots of this types of toolkit or frameworks like this but FinalRecon really has a good speed with perfection.

Extras :

  1. Some Modules Use API Keys to fetch data from different resources, these are optional, if we are not using an API key, they will be simply skipped. If we are interested in using these resources we can store your API key in the keys.json file.
  2. If we don't want to use a API key for a certain data source we just set its value to null, by default values of all available data sources are null.
  3. FinalRecon is a tool for Pentesters and it's designed for Linux based Operating Systems, other platforms like Windows and Termux are NOT support

Comments

Contact Form

Name*

Email *

Message *