Overview
Information gathering is the first phase of any security assessment. These tools help you discover network topology, identify live hosts, enumerate services, gather OSINT data, and map the attack surface before launching any attacks.Use Cases
- Network Discovery: Identify live hosts and network topology
- Service Enumeration: Detect running services and versions
- OSINT Research: Gather publicly available information
- Vulnerability Assessment: Find potential weaknesses in infrastructure
- Reconnaissance: Map target systems before penetration testing
Available Tools
Nmap
Industry-standard network scanner
Dracnmap
Enhanced Nmap interface with automation
Port Scanner
Built-in port scanning utility
Host to IP
DNS resolution and hostname lookup
Xerosploit
MITM attack framework for testing
RED HAWK
All-in-one information gathering scanner
ReconSpider
Advanced OSINT framework
IsItDown
Website availability checker
Infoga
Email OSINT gathering tool
ReconDog
Information gathering suite
Striker
Recon and vulnerability scanner
SecretFinder
Find API keys and secrets in JavaScript
Shodanfy
Shodan API information gatherer
rang3r
Multi-threaded port scanner
Breacher
Admin panel finder
Network Map (Nmap)
Description
Nmap is the industry-standard free and open source utility for network discovery and security auditing. It uses raw IP packets to determine available hosts, services, operating systems, firewalls, and hundreds of other characteristics.Installation
Usage Examples
Timing Templates: Use
-T0 through -T5 to control scan speed. -T4 is recommended for most scenarios. -T0 and -T1 are for IDS evasion.Dracnmap
Description
Dracnmap is an open source program that provides an enhanced interface for Nmap with automated scanning capabilities and pre-configured scan profiles.Installation
Running Dracnmap
Features
- Interactive menu-driven interface
- Pre-configured scan profiles
- Automated network discovery
- Result organization and reporting
Port Scanning
Description
Built-in port scanning utility that leverages Nmap for OS detection and service enumeration.Usage
Run from HackingTool menu. You’ll be prompted to enter a target IP address. The tool performs:- Operating system detection (
-O) - Service enumeration
- Skip host discovery (
-Pn) for firewalled hosts
Host to IP Converter
Description
Simple DNS resolution tool to convert hostnames to IP addresses.Usage
Xerosploit
Description
Xerosploit is a penetration testing toolkit designed to perform man-in-the-middle attacks for security testing purposes. It can intercept and manipulate network traffic.Installation
Running
Capabilities
- ARP spoofing
- DNS spoofing
- Traffic sniffing
- Session hijacking
- Code injection
RED HAWK
Description
All-in-one tool for information gathering and vulnerability scanning. Written in PHP, it provides comprehensive website reconnaissance.Installation
Running
Features
- WHOIS lookup
- Geo-IP lookup
- DNS lookup
- Subdomain scanner
- Reverse IP lookup
- Port scanning
- CMS detection
- Cloudflare detection
- Header analysis
- Link grabber
ReconSpider
Description
Advanced Open Source Intelligence (OSINT) framework for scanning IP addresses, emails, websites, and organizations to gather information from multiple sources.Installation
Running
Capabilities
- IP address intelligence
- Email OSINT
- Domain reconnaissance
- Organization profiling
- Social media enumeration
- Data aggregation from multiple sources
IsItDown
Description
Quick website availability checker using isitdownrightnow.com service.Usage
Opens web browser to https://www.isitdownrightnow.com/ for checking website status.Infoga
Description
Email OSINT tool that gathers email account information including IP, hostname, country, and more from different public sources.Installation
Running
Usage Examples
ReconDog
Description
Comprehensive information gathering suite with multiple reconnaissance modules.Installation
Running
Striker
Description
Recon and vulnerability scanning suite that combines multiple scanning techniques.Installation
Running
SecretFinder
Description
Python script to find sensitive data like API keys, access tokens, authorizations, JWT tokens, and other secrets in JavaScript files.Installation
Usage
Shodanfy (Shodan)
Description
Get ports, vulnerabilities, information, banners, and more for any IP using Shodan data.Installation
Port Scanner - rang3r
Description
Multi-threaded port scanner that scans all alive hosts within your specified IP range.Installation
Running
Breacher
Description
Advanced multithreaded admin panel finder that discovers hidden administrative interfaces on web applications.Installation
Running
Best Practices
Reconnaissance Methodology
-
Passive Reconnaissance First
- WHOIS lookups
- DNS enumeration
- Public records search
- Social media profiling
-
Active Reconnaissance
- Port scanning
- Service enumeration
- Banner grabbing
- Directory brute-forcing
-
Document Everything
- Keep detailed notes
- Save all scan outputs
- Create network diagrams
- Track discovered assets
Avoiding Detection
Ethical Scanning: Always respect rate limits, scan during authorized windows, and minimize impact on production systems.