Power Recon
About it Tool created in bash to perform all the reconnaissance phase on CTF machines, contains the nmap and ffuf tools.
Nmap is used for open port and port-associated services reconnaissance.
ffuf is used to discover hidden routes in web sites.
Execution Clone the repository
git clone Becomes roothttps://github.com/washingtonP1974/power_recon.git
sudo su Assign execution permissions.
chmod +x scanner.sh Script execution.
./scanner.sh
(SCRIPT.SH)
#!/bin/bash
#Author: Morgan Bin Bash
#Colors
greenColour="\e[0;32m\033[1m"
endColour="\033[0m\e[0m"
redColour="\e[0;31m\033[1m"
blueColour="\e[0;34m\033[1m"
yellowColour="\e[0;33m\033[1m"
purpleColour="\e[0;35m\033[1m"
turquoiseColour="\e[0;36m\033[1m"
grayColour="\e[0;37m\033[1m"
echo -e "\n${yellowColour}[!]${endColour} ${turquoiseColour}By WhosStranger${endColour}"
trap ctrl_c INT
function ctrl_c(){
echo -e "\n${yellowColour}[*]${endColour} ${purpleColour}Leaving...${endColour}"
exit 0
}
function tools(){
dependecies=(nmap ffuf)
echo -e "\n${yellowColour}[!]${endColour} ${purpleColour}Checking necessary tools${endColour}"
for program in "${dependecies[@]}"; do
echo -ne "\n${yellowColour}[+]${endColour} ${blueColour}Tool${endColour} ${purpleColour}$program...${endColour}"
test -f /usr/bin/$program #Which
if [ "$(echo $?)" == "0" ];then
echo -e "${greenColour}(V)${endColour}"
else
echo -e "${redColour}(X)${endColour}"
echo -e "\n${yellowColour}[!]${endColour} ${blueColour}Installing the tool${endColour} ${purpleColour}$program...${endColour}"
apt install $program -y > /dev/null 2>&1
sleep 1
echo -e "\n${yellowColour}[!]${endColour} ${blueColour}Successfully installed tool.${endColour}"
fi;sleep 1
done
}
function scan(){
sleep 1; clear
echo -e "\n${yellowColour}[-]${endColour} ${blueColour}Nmap = ${endColour}${purpleColour}n${endColour}"
echo -e "\n${yellowColour}[-]${endColour} ${blueColour}ffuf = ${endColour}${purpleColour}w${endColour}"
echo -ne "\n${yellowColour}[?]${endColour} ${blueColour}Choose an option: ${endColour}" && read Option
if [ "$Option" == "n" ];then
echo -ne "\n${yellowColour}[+]${endColour} ${blueColour}Type the IP address: ${endColour}" && read IP
echo -e "\n${yellowColour}[!]${endColour} ${purpleColour}Starting scanning...${endColour}\n"
nmap -p- --open --min-rate 5000 -n -Pn -sS $IP > OpenPorts
nmap -sCV -n -Pn $IP > Services
echo -e "\n${yellowColour}[*]${endColour} ${blueColour}Scanning and information saved successfully.${endColour}"
elif [ "$Option" == "w" ];then
echo -ne "\n${yellowColour}[+]${endColour} ${blueColour}Type the IP address: ${endColour}" && read URL
echo -e "\n${yellowColour}[!]${endColour} ${purpleColour}Starting fuzzing...${endColour}\n"
ffuf -t 1000 -mc 200 -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -u http://$URL/FUZZ
echo -e "\n${yellowColour}[*]${endColour} ${blueColour}Fuzzing successfully.${endColour}"
else
echo "\n ${yellowColour}{X}${endColour} ${blueColour}Select a correct option.${endColour}"
fi
}
#Main Function
if [ "$(id -u)" == "0" ]; then
tools
scan
else
echo -e "\n${yellowColour}[*]${endColour} ${turquoiseColour}Remember to run it as root.${endColour}\n"
fi

Last updated