ronin-recon
Description
ronin-recon is a micro-framework and tool for performing reconnaissance.
ronin-recon uses multiple workers which process different value types
(ex: IP, host, URL, etc) and produce new values. ronin-recon contains built-in
recon workers and supports loading additional 3rd-party workers from Ruby
files or 3rd-party git repositories. ronin-recon has a unique queue design
and uses asynchronous I/O to maximize efficiency.
Features
- Uses asynchronous I/O and fibers.
- Supports defining recon modules as plain old Ruby class.
- Provides built-in recon workers for:
- IP range enumeration.
- DNS lookup of host-names.
- Querying nameservers.
- Querying mailservers.
- DNS reverse lookup of IP addresses.
- DNS SRV record enumeration.
- DNS subdomain enumeration.
- Service/port scanning with
nmap
. - Enumerates the Common Name (
CN
) and subjectAltName
s within all SSL/TLS
certificates. - Web spidering.
- HTTP directory enumeration.
- Supports loading additional recon modules from Ruby files or from installed
3rd-party git repositories.
- Builds a network graph of all discovered assets.
- Provides a simple CLI for listing workers or performing recon.
- Supports many different output file formats:
- Supports automatically saving recon results into ronin-db.
Anti-Features
- Does not require API keys to run.
- Not just a script that runs a bunch of other recon tools.
- Does not use AI.
Synopsis
$ ronin-recon
Usage: ronin-recon [options]
Options:
-V, --version Prints the version and exits
-h, --help Print help information
Arguments:
[COMMAND] The command name to run
[ARGS ...] Additional arguments for the command
Commands:
completion
help
irb
new
run
test
worker
workers
List all available recon workers:
$ ronin-recon workers
api/crt_sh
dns/lookup
dns/mailservers
dns/nameservers
dns/reverse_lookup
dns/srv_enum
dns/subdomain_enum
dns/suffix_enum
net/cert_enum
net/cert_grab
net/ip_range_enum
net/port_scan
net/service_id
web/dir_enum
web/email_addresses
web/spider
Print info about a specific recon worker:
$ ronin-recon worker dns/lookup
[ dns/lookup ]
Summary: Looks up the IPs of a host-name
Description:
Resolves the IP addresses of domains, host names, nameservers,
and mailservers.
Accepts:
* domains
* hosts
* nameservers
* mailservers
Run the recon engine on a single domain:
$ ronin-recon run example.com
Run the recon engine on a single host-name:
$ ronin-recon run www.example.com
Run the recon engine on a single IP address:
$ ronin-recon run 1.1.1.1
Run the recon engine on an IP range:
$ ronin-recon run 1.1.1.1/24
Run the recon engine on multiple targets:
$ ronin-recon run example1.com example2.com secret.foo.example1.com secret.bar.example2.com 1.1.1.1/24
Run the recon engine and ignore specific hosts, IPs, URLs, etc.:
$ ronin-recon run --ignore staging.example.com example.com
Save the recon results to a plain-text file:
$ ronin-recon run -o output.txt example.com
Save the recon results to a directory of multiple plain-text files:
$ ronin-recon run -o output_dir example.com
Save the recon results to a CSV file:
$ ronin-recon run -o output.csv example.com
Save the recon results to a JSON file:
$ ronin-recon run -o output.json example.com
Save the recon results to a NDJSON file:
$ ronin-recon run -o output.ndjson example.com
Save the recon results to a PNG image:
$ ronin-recon run -o output.png example.com
Save the recon results to a SVG image:
$ ronin-recon run -o output.svg example.com
Save the recon results to a PDF image:
$ ronin-recon run -o output.pdf example.com
Generate a boilerplate recon worker file, with some custom information:
$ ronin-recon new example_worker.rb \
--name Example \
--authors Postmodern \
--description "This is an example."
Generate a ronin repository of your own payloads (or exploits):
$ ronin-repos new my-repo
$ cd my-repo/
$ mkdir recon
$ ronin-recon new recon/my_recon.rb \
--name MyRecon \
--authors You \
--description "This is my payload."
$ vim recon/my_recon.rb
$ git add recon/my_recon.rb
$ git commit
$ git push
Examples
Defining a custom recon worker:
require 'ronin/recon/worker'
module Ronin
module Recon
module DNS
class FooBar
register 'dns/foo_bar'
summary 'My DNS recon technique'
description <<~DESC
This recon worker uses the foo-bar technique.
Bla bla bla bla.
DESC
author 'John Smith', email: '...'
accepts Domain
outputs Host
intensity :passive
param :wordlist, String, desc: 'Optional wordlist to use'
def process(value)
yield Host.new(discovered_host_name)
end
end
end
end
end
Manually running the recon engine:
require 'ronin/recon/engine'
domain = Ronin::Recon::Values::Domain.new('github.com')
Ronin::Recon::Engine.run([domain], max_depth: 3) do |value,parent|
case value
when Ronin::Recon::Values::Domain
puts "Found domain #{value} for #{parent}"
when Ronin::Recon::Values::Nameserver
puts "Found nameserver #{value} for #{parent}"
when Ronin::Recon::Values::Mailserver
puts "Found mailserver #{value} for #{parent}"
when Ronin::Recon::Values::Host
puts "Found host #{value} for #{parent}"
when Ronin::Recon::Values::IP
puts "Found IP address #{value} for #{parent}"
end
end
Requirements
Install
$ gem install ronin-recon
Gemfile
gem 'ronin-recon', '~> 0.1'
gemspec
gem.add_dependency 'ronin-recon', '~> 0.1'
Post-Install
Running nmap
/ masscan
without sudo
You can configure nmap
and masscan
to run without sudo
by setting their
capabilities:
sudo setcap cap_net_raw,cap_net_admin,cap_net_bind_service+eip $(which nmap)
sudo setcap cap_net_raw,cap_net_admin,cap_net_bind_service+eip $(which masscan)
Development
- Fork It!
- Clone It!
cd ronin-recon/
./scripts/setup
git checkout -b my_feature
- Code It!
bundle exec rake spec
git push origin my_feature
License
ronin-recon - A micro-framework and tool for performing reconnaissance.
Copyright (c) 2023-2024 Hal Brodigan (postmodern.mod3@gmail.com)
ronin-recon is free software: you can redistribute it and/or modify
it under the terms of the GNU Lesser General Public License as published
by the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.
ronin-recon is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU Lesser General Public License for more details.
You should have received a copy of the GNU Lesser General Public License
along with ronin-recon. If not, see https://www.gnu.org/licenses/.