BOOK THIS SPACE FOR AD
ARTICLE ADr3conwhal3 is a multifunctional recon automation framework designed to streamline the reconnaissance phase of web application security assessments. By filtering collected data and processing it into actionable information, r3conwhal3 enhances the efficiency of security testing workflows.
Passive Subdomain Enumeration: This technique involves discovering subdomains without directly interacting with the target’s infrastructure, thereby minimizing detection risks. r3conwhal3 leverages tools such as subfinder, assetfinder, amass and subkill3r(built-in subdomain harvester) to gather a comprehensive list of subdomains. These tools query various public sources, DNS databases and APIs to compile an extensive list of subdomains associated with the target domain.To install the r3conwhal3, follow these steps:
Prerequisites: Ensure Go >= 1.21.1+ is installed and paths are correctly set ($GOPATH, $GOROOT).Run the following command to get the r3conwhal3:go install -v github.com/LiterallyEthical/r3conwhal3/cmd/r3conwhal3@latest2. Run the following command to install dependencies:
wget "https://raw.githubusercontent.com/LiterallyEthical/r3conwhal3/main/installer.sh"chmod +x installer.sh
./installer.shSee the wiki for getting more detail about installation process.Pull the imagedocker pull literallyethical/r3conwhal3Run the containerdocker run -it -v </path/to/folder>:/app/results -p 8080:8080 --rm literallyethical/r3conwhal3 run -d <target-domain> -o /app/results
Specify the OutputFolder to saving results for later and choose a target domain to enumerate. For detail information, please refer to the Docker documentation.
The config.env file enables control over the entire execution of the automation chain.You can find the default configuration file on here.The configuration of r3conwhal3 is straightforward, you can set up the config.env file with the desired parameters according to your neeeds.It is possible to set various scanning modes, tool options, personalized wordlists etc. See the wiki for detail explanation guide about config options.r3conwhal3 [run] [galery] optionsRunning the scan with default(ALL) options
r3conwhal3 run -A -d <domain>Running the scan with custom options
r3conwhal3 run -d <domain> [-c <path-to-config-dir>] [-outDir <path-to-out-dir>]Performing only passive scan & web_ops
r3conwhal3 run -pw -d <domain>Performing quick vulnerability scan on all gathered subdomains
r3conwhal3 run -pav -d <domain>Starting r3conwhal3 web galery for inspecting previous scan results
r3cnwhal3 galery -p <path-to-the-screenshot-directory>You can find previously gathered screenshots on $OUTDIR/screenshots(defaultOUTDIR:”$HOME/user/r3conwhal3/results/<target-domain+timestamp>”).Run the containerdocker run -it -v </path/to/folder>:/app/results -p 8080:8080 --rm literallyethical/r3conwhal3 run -d <target-domain> -o /app/resultsSpecify the OutputFolder to saving results for later and choose a target domain to enumerate. For detail information, please refer to the Docker documentation.Here are a few reasons why r3conwhal3 should be your go-to tool for reconnaissance:
Efficiency: Automates multiple recon tasks, saving you time and effort.Accuracy: Provides precise and actionable insights by intelligently analyzing collected data.Flexibility: Customizable to fit various recon needs.Performance: Optimized for speed and resource usage, ensuring quick results even for large-scale scans.Bug bounty hunters can leverage r3conwhal3 to efficiently gather subdomains, enumerates services running on the background, detect common vulnerabilities, hence increasing their chances of finding high-value bugs with the collected intellegince.
As a penetration tester, you need to gather comprehensive information about your target quickly. r3conwhal3 automates this process, allowing you to focus on exploiting vulnerabilities rather than spending hours on manual recon.
Security researchers can use r3conwhal3 to automate data collection across multiple targets, helping them identify trends and common vulnerabilities in web applications.
Corporations can easily integrate r3conwhal3 into their security pipelines thanks to its docker image, to continuously monitor their assets while enhancing their overall workflows, ensuring that any new vulnerabilities are quickly identified and addressed.
We welcome contributions from the community to help improve r3conwhal3. If you encounter any issues or have suggestions for new features, please open an issue on our GitHub repository. Your feedback and contributions are highly valued and will help us enhance the tool further.
If you find r3conwhal3 helpful, don’t forget to leave a star on our GitHub repository. Your support is greatly appreciated!