• We just launched and are currently in beta. Join us as we build and grow the community.

InfoSploit – Information Gathering Tool

freelo

Audience Engagement Tactician
F Rep
0
0
0
Rep
0
F Vouches
0
0
0
Vouches
0
Posts
92
Likes
156
Bits
2 MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1 400 XP
Red-and-White-Modern-Church-Presentation-2.png


Hey Folks, in this article we will discuss on an very lightweight information gathering tool as it can easily install and run called “InfoSploit”. The InfoSploit tool is also available for linux, window and android phones ( termux ) that is coded in both bash and python languages.

Let’s take a look 😛 !!

Installation

First of all we will download this tool from github by using the git command. After downloading is done then we will go to directory of this tool and execute the bash command in order to install this tool completely. If you have installed all the requirements then this tool will be installed soon, otherwise it will take some time. But after installing it will give us the command to boot this tool directly from anywhere.

git clone https://github.com/CybernetiX-S3C/InfoSploit
cd InfoSploit/
bash install
Infosploit1234git clone
https://github.com/CybernetiX-S3C/InfoSploitcd InfoSploit/bash installInfosploit

1-4.png

Features

Now you can see all the available special features in the tool, through which we can have good footprint against any target.

2-4.png

DNS lookup

We can control this tool numerically as you can see in the image below. After selecting the first option, it dumps all DNS records of the target web application.

3-4.png

Open Services

Similarly, by selecting the fifth option we can get all the details of open and running services on the target web server.

4-4.png

Crawling

Crawling is the best way to find sensitive locations available on the target web application.

5-5.png

Subdomain Finding

As you can see in the image below how easily all subdomains have been identified.

6-4.png


Nice 😛 !! Not only this, because in this tool we get lots of options as you can see in the image below which you can use one by one yourself.

7-4.png
About the AuthorShubham Goyal Certified Ethical Hacker, information security analyst, penetration tester and researcher. Can be Contact on Linkedin.
 

428,436

311,073

311,082

Top