Recon suites review
Intro
What? This is a December 2020 hunting/pentesting recon suites review made by myself. I have compared and review every tool one by one and obtained a general view of the "state-of-the-art" of the most used recon tools.
Why? Lately there has been an explosion in the creation of these types of tools, and I was simply curious about how each one faced the challenge of profiling one or more objectives.
How? First, I have analyzed what features the suites have and then what tools they used to achieve those functionalities.
From my POV a recon tool should get as much information as possible from a target regardless of its size. From subdomains enumeration to analyze all JS and their possible secrets, through SSL failures or consult information in public sources. Neither am I looking for a tool that will get all the low-hanging fruit for P1 automatically continuously, let's be honest, most people are looking for this, and you don't have the necessary to set up a competent infrastructure to achieve it.
I thought about making measurements on the number of subdomains that each tool retrieves and the number of information that they retrieve in general, but this poses several problems. In the end, these suites launch existing subdomain enumeration tools, so I'll do that other day (spoiler! 😲) and it doesn't really depend on the suite itself. On the other hand, each tool does different processes with different tools, so it would not be fair (or measurable, I think) to make a comparison of the quantity or quality of information they obtain.
My perfect recon suite should be able to do the following: run a command, review its contents, and then run another tool with that information, like "subdomain enum | httpx | gf | dalfox". Yeah I know, it's a simple oneliner, but also, I want a lot of different checks in an easy readable and organized way. Easy? Let's see.
This is not intended to be a serious investigation, a technical paper, or anything like that, just a series of tests that I have done for fun. The results shown are my opinion and if at any time you don't like them, or you don't agree, you can stop reading or explain to me how I could have done it better 😉
All the results of my runs and tests are posted here, it has three sheets (Summary, features and tools).
Tools
Small summary of each tool with the features and results that I got. This section not follows any special order.
Author: harsh-bothra & KathanP19
Language: Bash
It's composed of a lot of simple bash scripts that are calling each other which makes it much easier to add some changes that fit for you or what you want or add your own.
Pros
Superb workflow.
Easy to understand and adapt for your needs.
Best and trendy tools like nuclei, dalfox or gf patterns.
Scope defined workflows.
Cons
No web screenshots.
Lack of output customization.
Author: eslam3kl
Language: Python2
This tool continues the process of the author's tool 3klector and have a strong workflow which covers a lot of things.
Pros
ASN and acquisitions collector.
Provides Dorks to check manually.
Cons
Python2 died a year ago, too much for a live project imho.
No subdomain bruteforce.
No web screenshots.
Author: Screetsec
Language: Python3
I have been using this tool for a lot of time, It does a very good job of enumerating subdomains giving complete results.
Pros
Uses Shodan for fast port scan.
Vhosts checker.
Wordlist generator from target.
Slack notifications.
Cons
Needs API keys.
No vulns scanner.
No endpoints checks like xss, params, js, etc.
Author: j3ssie
Language: Python3
One of the well known, in a short time it has become one of the best known, now its author is evolving this project in huntersuite.io (paid).
Pros
Web interface.
Nice report output.
Slack notifications.
ffuf for fuzzing.
Cons
No WAF checker
Jaeles for vulns scan feels buggy.
No endpoints analysis like potential xss, params, js, etc.
Author: thewhiteh4t
Language: Python3
Recently added to the official Kali repositories, increasingly known and used. Mainly focused on web scan, but it does the recon phase too.
Pros
Very good cli output.
Customizable files output.
Not use external tools, does almost everything by its own.
Cons
Need API keys.
Only passive subdomain enumeration.
Lack of features surprisingly.
Author: yogeshojha
Language: Python3
A tool driven by a web interface (only) with a good integration of the best tools such as amass, nuclei or dirsearch.
Pros
Web interface.
Customizable files output.
Schedule feature and dashboard.
Exclude subdomains feature.
Cons
No cli output.
No subdomains permutations or bruteforce.
Displaying directory enumeration in web interface is not good at all.
Author: SilverPoision
Language: Bash
This tool has not been updated for more than a year but anyway it does it works really well, not much features but good implemented.
Pros
ASN enumeration.
Vhosts detection.
Slack integration.
Cons
API keys needed.
No endpoints analysis like potential xss, params, js, etc.
Author: epi052
Language: Python3
This is a total different approach from the others. In this tool you have to define a recon pipeline or use one of previously defined, maybe needs more learning curve (but good docs) but totally customizable.
Pros
PIpeline customizable definition.
Absolutely customizable approach.
Scheduler.
Cons
Searchsploit for vulns detection.
No endpoints analysis like potential xss, params, js, etc.
Author: shmilylty
Language: Python3
I didn't know anything about this tool but it's really famous (almost 3K stars) and that's because it uses almost every API that exists to give one of the best passive scan experience thtat exists for now.
Pros
More than 40 API keys integration.
Zone transfer checker.
Scheduler.
Cons
Searchsploit for vulns detection.
No endpoints analysis like potential xss, params, js, etc.
Author: SolomonSklash
Language: Bash
I have been using this tool for a long time during my pentests and I like it very much. It's a scripted bash pipeline with a lot of tests.
Pros
Really good cli output.
CORS specific checks.
ffuf for fuzzing.
Cons
Nikto for web vulns.
Notica for notifications.
Author: x1mdev
Language: Bash
Nice all-in-one installer designed to start the recon process in a low hardware device like Raspberry Pi in a lightweight way.
Pros
Best and trendy tools like nuclei, dalfox or gf patterns.
Slack and Discord notifications.
Lot of passive subdomains tools included.
Cons
Need API keys.
Installer install tools not used in the script.
Author: aufzayed
Language: Python3
Little known tool that does the whole recognition process in a custom way.
Pros
JS extractor.
No use 3rd parties tools.
Cons
Lack of features.
No endpoints analysis like potential xss, params, js, etc.
Author: nahamsec
Language: Bash
Well known tool created by one of the big guys. It does the work in a fast an easy way and create a pretty html report easy to review.
Pros
Exclude subdomains feature.
Wordlist generation.
Cons
No vulns/tech scanner.
No endpoints analysis like potential xss, params, js, etc.
Author: 1N3
Language: Bash
This is an All-In-One hacking tool but apart from this, also have a good recon capabilities that performs almost everything.
Pros
ASN enumeration.
Transfer zone, vhosts and and waf checks.
Most complete in features tool.
Cons
Too heavy to do recon (docker image > 6 GB).
No endpoints analysis like potential xss, params, etc.
Author: skavngr
Language: Python2
I have been using this tool some time ago because it provides an easy human-readable output, with suggestions, good workflow and ETA in every step.
Pros
Really nice cli output results.
Suggests resolution for each bug found.
Transfer zone
Cons
Oldie tools like nikto, uniscan.
Python2 died a year ago, too much for a live project imho.
Results
Features
Sn1per
Sudomy
Bheem & osmedeus
ReconPi & ChompScan
Rapidscan & lazyrecon & 3klcon
Workflow and usage
Bheem
ReconPi
Osmedeus & 3klcon
Sudomy
rapidscan & chompscan
General
Bheem
ReconPi
Sn1per & osmedeus
Sudomy & 3klcon
rapidscan & chompscan
Final thoughts
I was very surprised by the amount of very good tools that exist for recognition, I have discovered many very good tools that I did not know and others I have been able to understand better how they work. I was also surprised by how quickly nuclei has established itself as one of the best tools that exist in the panorama and on the other hand, that dorking is no longer used, even if it is simply to return a list of urls to check manually. Bheem seems to me to be the best tool that adapts to my work methodology and I hope they continue to maintain and update it because it does the job very well.
Finally, thanks to all the tool developers who facilitate our work and implement the recon methodology better and better.
Last updated