Search Results for: reconnaissance

Ashok in Action — Elevate Recon Skills

Ashok in Action — Elevate Recon Skills

Before we go on a road trip on any adventure, what’s the first thing we do? We do a proper plan! We check the maps (Nowadays on a phone Map), look for the best routes, and maybe even scout out a few interesting stops along the way. Or we watch any YouTube video of that trip to know about various things. Skipping this step would leave us wandering aimlessly, and nobody wants that. The same goes for cybersecurity spaces.

Reconnaissance, or recon in short, is that essential planning phase in our cybersecurity world. It’s like doing a bit of homework before doing the attack. Whether we’re looking to fortify your defenses or test them, understanding what we’re up against is half the battle. Without good recon, it’s like trying to find “One Piece” without a road poneglyphs—pretty much impossible!

Installation and use of Ashok on Kali Linux

In this article, We’re excited to introduce to Ashok, a tool that’s as reliable as our favorite road trip song playlist. Whether we’re just curious or looking to add a new skill to our cybersecurity toolkit, We hope this journey as enjoyable as discovering a new vulnerabilities on the test target. Let’s get started.

 As written on Ashok’s GitHub Page:

Before any real attacks are planned So Ashok is an Incredible fast recon tool for penetration tester which is specially designed for Reconnaissance phase. And in Ashok-v1.1 you can find the advanced google dorker and wayback crawling machine.

Main Features of Ashok

  • Wayback Crawler Machine
  • Google Dorking without limits
  • Github Information Grabbing
  • Subdomain Identifier
  • Cms/Technology Detector With Custom Headers

Install Ashok on Kali Linux

 Installing Ashok on our Kali Linux system is very easy. We just need to open our terminal window and apply the following command to clone it from GitHub:

git clone https://github.com/powerexploit/Ashok

After that we can see the output in the following screenshot:

clonning Asoke from GitHub

In the above screenshot we can see the output of above command. Now Ashok is on our system. So we just need to change our current working directory to Ashok by using the following command:

cd Ashok

Now we need to install requirements by applying following command:

python -m pip install -r requirements.txt

This command will install all the necessary things to run on our Kali Linux system. As we can see in the following screenshot.

Installing requirements for Ashok

Now we can run Ashok tool on our Kali Linux system.

Running Ashok on Kali Linux

Now the time has come that we run Ashok on our system. Before running it on a target we check Ashok’s help section. To do that we need to run following command:

python Ashok.py --help

In the following screenshot we can see the output of the above command:

Ashok help section

In the above screenshot we can see that how to use Ashok for different recons. In the following list we shows the uses of Ashok:

HTTP headers using –headers

DNS lookup using –dns

Sub-domain lookup using –subdomain

NMAP scan using –nmap

Extract data using Github username of target –username

CMS (Content Management System like WordPress and other) Detection using –cms

Extract links from target domain using –extract

CIDR (Classless Inter-Domain Routing) subnet lookup using –cidr

Banner grabbing using –banner

GeoIP of target IP address using –geoip

Internet archive crawling of target domain using –wayback

Google dorking using number of results as dork number using –dorknumber

For more details we can head over to Ashok’s WiKi Page. Let’s do a DNS scan of google.com. To do this we need to run following command:

python Ashok.py --dns google.com

We can see the output on the following screenshot:

DNS scan using Ashok

We also search for Internet archive (Wayback Machine) crawling on Ashok on our domain by using following command:

python Ashok.py --wayback kalilinx.in

 We can see the result on the following screenshot:

Ashok wayback machine crawling testing

The outputs of this scan also saved in Ashok’s directory as we can see in the screenshot below.

Wayback Machine's results stored

This is the uses of Ashok as our recon tool. Here just for example we show two use cases. But it is capable to do more. We can check it’s Wiki page to learn more uses of it.

This is how we can install and use Ashok and do our reconnaissance works easily on our Kali Linux system. Love our article? Make sure to follow us on Twitter and GitHub, we post article updates there. To join our KaliLinuxIn family, join our Telegram Group & Whatsapp Channel. We are striving to build a community for Linux and cybersecurity. For anything we always happy to help everyone on the comment section. As we know our comment section is always open to everyone. We read each and every comment and we always reply.

CompTIA Pentest+ (PT0-002) – Lesson 16: Performing Post-Exploitation Pivoting and System Penetration

August 6, 2024 CompTIA Pentest+ (PT0-002) – Lesson 16: Performing Post-Exploitation Pivoting and System Penetration Guide on Performing Post-Exploitation Pivoting and System Penetration Objectives: When given a scenario, research attack vectors and perform network attacks. When given a scenario, perform post-exploitation techniques. Explain the use cases of the following tools in the phases of a …

CompTIA Pentest+ (PT0-002) – Lesson 16: Performing Post-Exploitation Pivoting and System Penetration Read More »

CompTIA Integrated CertMaster Learn + Labs for Security+ (SY0-701)

August 6, 2024 What’s included Integrated eLearning and gradable, hands-on Labs in a seamless workflow Flexible content and resources suit a variety of classroom formats For organizations purchasing for groups of students Student license valid for 12 months CompTIA Security+ equips you with the foundational security skills necessary to safeguard networks, detect threats, and secure …

CompTIA Integrated CertMaster Learn + Labs for Security+ (SY0-701) Read More »

GenZ IAM: Transforming Identity and Access Management with Gen-AI

GenZ IAM: Transforming Identity and Access Management with Gen-AI

In today’s digital landscape, identity and access management (IAM) and regulating access to sensitive data and resources are paramount for any organization. From a zero-trust framework to a cybersecurity mesh architecture, the identity fabric is the core and is considered the most critical element in defining your security strategy. It is and was IAM that…

The post GenZ IAM: Transforming Identity and Access Management with Gen-AI appeared first on Cybersecurity Exchange.

The Evolution of Penetration Testing: Adapting CompTIA PenTest+ Skills for Modern VAPT Challenges

The Evolution of Penetration Testing: Adapting CompTIA PenTest+ Skills for Modern VAPT Challenges

In today’s rapidly evolving cyber landscape, penetration testing has become a critical component of an organization’s security strategy. The CompTIA PenTest+ certification provides IT professionals with the skills needed to effectively conduct vulnerability assessments and penetration testing (VAPT). This blog explores the evolution of penetration testing and how the skills acquired through the CompTIA PenTest+ …

The Evolution of Penetration Testing: Adapting CompTIA PenTest+ Skills for Modern VAPT Challenges Read More »

Advanced VAPT Tactics: Lessons from CEHv12 for Proactive Cyber Defense

Advanced VAPT Tactics: Lessons from CEHv12 for Proactive Cyber Defense

In today’s rapidly evolving cyber threat landscape, it is imperative for organizations to stay ahead of potential vulnerabilities and attacks. This necessitates a robust approach to Vulnerability Assessment and Penetration Testing (VAPT). Drawing from the latest Certified Ethical Hacker (CEH) v12 and CompTIA PenTest+ curricula, this blog delves into advanced VAPT tactics to bolster proactive …

Advanced VAPT Tactics: Lessons from CEHv12 for Proactive Cyber Defense Read More »

Bridging the Gap: Integrating CompTIA PenTest+ Techniques into VAPT Practices

Bridging the Gap: Integrating CompTIA PenTest+ Techniques into VAPT Practices

In the dynamic landscape of cybersecurity, the integration of cutting-edge techniques is crucial to maintaining robust defenses against evolving threats. This blog post explores the synergy between CompTIA PenTest+ methodologies and Vulnerability Assessment and Penetration Testing (VAPT) practices, highlighting how these approaches complement each other to enhance security posture. Introduction to VAPT and Its Importance …

Bridging the Gap: Integrating CompTIA PenTest+ Techniques into VAPT Practices Read More »

Comprehensive VAPT Strategies: A Deep Dive into CEHv12 Methodologies

Comprehensive VAPT Strategies: A Deep Dive into CEHv12 Methodologies

In today’s digital landscape, cybersecurity is paramount. Vulnerability Assessment and Penetration Testing (VAPT) play a crucial role in safeguarding organizations from cyber threats. This blog post delves into the comprehensive strategies of VAPT, aligning with Certified Ethical Hacker (CEHv12) methodologies and the CompTIA PenTest+ course. What is VAPT? VAPT is a process that identifies and …

Comprehensive VAPT Strategies: A Deep Dive into CEHv12 Methodologies Read More »

Navigating the Cybersecurity Landscape: VAPT Insights from CEHv12 Experts

Navigating the Cybersecurity Landscape: VAPT Insights from CEHv12 Experts

In today’s digital age, Cybersecurity is more critical than ever. With the constant evolution of cyber threats, businesses and organizations must stay ahead by implementing robust security measures. One of the most effective strategies is Vulnerability Assessment and Penetration Testing (VAPT). This blog post delves into VAPT insights from CEHv12 experts, providing invaluable knowledge for …

Navigating the Cybersecurity Landscape: VAPT Insights from CEHv12 Experts Read More »

Master ChatGPT in Cybersecurity: ChatGPT hacking Courses for Ethical hackers

In today’s digital age, cybersecurity is more critical than ever. With cyber threats evolving rapidly, staying ahead requires leveraging cutting-edge technologies. One such revolutionary technology is ChatGPT, an advanced AI model developed by OpenAI. This blog explores the intersection of ChatGPT with cybersecurity, focusing on how it can be a powerful tool for ethical hacking…

The post Master ChatGPT in Cybersecurity: ChatGPT hacking Courses for Ethical hackers appeared first on Cybersecurity Exchange.

Open Whatsapp chat
Whatsapp Us
Chat with us for faster replies.