capt-meelo / LazyRecon

An automated approach to performing recon for bug bounty hunting and penetration testing.
MIT License
442 stars 100 forks source link

Again the same. finishes in 1 second. #18

Open ikarann opened 3 years ago

ikarann commented 3 years ago

root@kali:~/LazyRecon# ./LazyRecon.sh twilio.com

██╗ █████╗ ███████╗██╗ ██╗██████╗ ███████╗ ██████╗ ██████╗ ███╗ ██╗ ██║ ██╔══██╗╚══███╔╝╚██╗ ██╔╝██╔══██╗██╔════╝██╔════╝██╔═══██╗████╗ ██║ ██║ ███████║ ███╔╝ ╚████╔╝ ██████╔╝█████╗ ██║ ██║ ██║██╔██╗ ██║ ██║ ██╔══██║ ███╔╝ ╚██╔╝ ██╔══██╗██╔══╝ ██║ ██║ ██║██║╚██╗██║ ███████╗██║ ██║███████╗ ██║ ██║ ██║███████╗╚██████╗╚██████╔╝██║ ╚████║ ╚══════╝╚═╝ ╚═╝╚══════╝ ╚═╝ ╚═╝ ╚═╝╚══════╝ ╚═════╝ ╚═════╝ ╚═╝ ╚═══
v1.3 by @CaptMeelo

--==[ Setting things up ]==--

[+] Creating results directories... [] /root/LazyRecon/results/twilio.com/subdomain [] /root/LazyRecon/results/twilio.com/cors [] /root/LazyRecon/results/twilio.com/ip [] /root/LazyRecon/results/twilio.com/portscan [] /root/LazyRecon/results/twilio.com/screenshot [] /root/LazyRecon/results/twilio.com/directory

--==[ Enumerating subdomains ]==--

[+] Running Amass... flag provided but not defined: -d

[+] Running subfinder... flag provided but not defined: -b Usage of /root/go/bin/subfinder: -all Use all sources (slow) for enumeration -cd Upload results to the Chaos API (api-key required) -config string Configuration file for API Keys, etc (default "/root/.config/subfinder/config.yaml") -d string Domain to find subdomains for -dL string File containing list of domains to enumerate -exclude-sources string List of sources to exclude from enumeration -json Write output in JSON lines Format -ls List all available sources -max-time int Minutes to wait for enumeration results (default 10) -nC Don't Use colors in output -nW Remove Wildcard & Dead Subdomains from output -o string File to write output to (optional) -oD string Directory to write enumeration results to (optional) -oI Write output in Host,IP format -oJ Write output in JSON lines Format -r string Comma-separated list of resolvers to use -rL string Text file containing list of resolvers to use -recursive Use only recursive subdomain enumeration sources -silent Show only subdomains in output -sources string Comma separated list of sources to use -t int Number of concurrent goroutines for resolving (default 10) -timeout int Seconds to wait before timing out (default 30) -v Show Verbose output -version Show version of subfinder

[+] Combining subdomains...
cat: '/root/LazyRecon/results/twilio.com/subdomain/.txt': No such file or directory [] Check the list of subdomains at /root/LazyRecon/results/twilio.com/subdomain/final-subdomains.txt

--==[ Checking for subdomain takeovers ]==--

[+] Running subjack...
cat: /root/LazyRecon/results/twilio.com/subdomain/final-takeover.tmp: No such file or directory rm: cannot remove '/root/LazyRecon/results/twilio.com/subdomain/final-takeover.tmp': No such file or directory [*] Check subjack's result at /root/LazyRecon/results/twilio.com/subdomain/final-takeover.txt

--==[ Checking CORS configuration ]==--

[+] Running CORScanner...
Traceback (most recent call last): File "/root/LazyRecon/tools/CORScanner/cors_scan.py", line 8, in from common.corscheck import CORSCheck File "/root/LazyRecon/tools/CORScanner/common/corscheck.py", line 1, in import gevent.monkey ImportError: No module named gevent.monkey [*] Check the result at /root/LazyRecon/results/twilio.com/cors/final-cors.txt

--==[ Resolving IP addresses ]==--

[+] Running massdns...
[*] Check the list of IP addresses at /root/LazyRecon/results/twilio.com/ip/final-ips.txt

--==[ Port-scanning targets ]==--

[+] Running masscan...
FAIL: target IP address list empty [hint] try something like "--range 10.0.0.0/8" [hint] try something like "--range 192.168.0.100-192.168.0.200" warning: failed to load external entity "/root/LazyRecon/results/twilio.com/portscan/masscan.xml" unable to parse /root/LazyRecon/results/twilio.com/portscan/masscan.xml cat: /root/LazyRecon/results/twilio.com/portscan/masscan.xml: No such file or directory [*] Masscan Done! View the HTML report at /root/LazyRecon/results/twilio.com/portscan/final-masscan.html

[+] Running nmap...
Host discovery disabled (-Pn). All addresses will be marked 'up' and scan times will be slower. Starting Nmap 7.91 ( https://nmap.org ) at 2020-10-19 09:58 EDT Error #486: Your port specifications are illegal. Example of proper form: "-100,200-1024,T:3000-4000,U:60000-" QUITTING! compilation error: file /root/LazyRecon/results/twilio.com/portscan/nmap.xml line 1 element nmaprun xsltParseStylesheetProcess : document is not a stylesheet [*] Nmap Done! View the HTML report at /root/LazyRecon/results/twilio.com/portscan/final-nmap.html

--==[ Taking screenshots ]==--

[+] Running aquatone...
aquatone v1.7.0 started at 2020-10-19T09:58:22-04:00

No targets found in input. [*] Check the result at /root/LazyRecon/results/twilio.com/screenshot/aquatone/aquatone_report.html

--==[ Bruteforcing directories ]==--

[+] Running dirsearch...
[]Creating output directory... cat: /root/LazyRecon/results/twilio.com/screenshot/aquatone/aquatone_urls.txt: No such file or directory [] Check the results at /root/LazyRecon/results/twilio.com/directory/dirsearch/

--==[ DONE ]==--

ikarann commented 3 years ago

Set your API keys here

    ~/go/bin/subfinder --set-config VirustotalAPIKey=b31835f74bdd54428a8239eac09dc79338d6a6b8406a641234567890
    ~/go/bin/subfinder --set-config SecurityTrailsKey=Fa05N0B2W1le3sK8TBn1234567890
    ~/go/bin/subfinder --set-config CensysUsername=d8dc1420-64b3-1234567890a614d3abd3e2,CensysSecret=LtfYceiFCgUo9qkQDRqtkCJQfn1234567890
    ~/go/bin/subfinder --set-config ShodanAPIKey=vGoAlDqzCmaox7J0PqrLw1234567890

this is what i have set.

i have removed some lines here as i dont have their api keys.