XRay :- A tool for recon, mapping and OSINT gathering from public networks.
1) It'll bruteforce subdomains using a wordlist and DNS requests.
For every subdomain/ip found, it'll use Shodan to gather open ports and other intel.
2) If a ViewDNS API key is provided, for every subdomain historical data will be collected.
3) For every unique ip address, and for every open port, it'll launch specific banner grabbers and info collectors.
4) Eventually the data is presented to the user on the web ui.
Let's Start.
Building a Docker image
1) git clone https://github.com/evilsocket/xray.git
2) cd xray
3) docker build -t xraydocker .
4) Once built, XRay can be started within a Docker container using the following:
>docker run --rm -it -p 8080:8080 xraydocker xray -address 0.0.0.0 -shodan-key shodan_key_here -domain example.com
>Manual Compilation
Make sure you are using Go >= 1.7, that your installation is working properly, that you have set the $GOPATH variable and you have appended $GOPATH/bin to your $PATH.
5) Then:
> go get github.com/evilsocket/xray
> cd $GOPATH/src/github.com/evilsocket/xray/
> make
You'll find the executable in the build folder.
That's all
Follow us for more...
No comments:
Post a Comment