Peculiarities
- About DNS
- Visual display of DNS using the DNS bucket
- WHOIS Information
- TLS Data-supported ciphers, TLS versions, certificate data, and SANs
- Port scanning
- Scanning services and scripts
- Eliminate urls and detect dir/files
- Subdomain enumeration - uses Google dorking, DNS container, SAN queries and bruteforce
- Retrieving web application data:
- CMS detection
- Web Server Information and X-Powered-By
- robots.txt and sitemap extraction
- Checking cookies
- Retrieves all fuzzy URLs
- Detects HTML forms
- Gets all email addresses
- Scans the target audience for vulnerable S3 buckets and lists them for files with sensitive information
- Detects known WAFs
- Support for anonymous routing via Tor/Proxies
- Uses asyncio for better performance
- Save output to files - split targets into folders and modules into files
It will do everything from gathering DNS records, getting WHOIS information, getting TLS data, detecting the presence of a WAF, to redistributing dir breaks and counting subdomains. Each scan is output to a corresponding file.
Because most Raccoon scans are independent and independent of each other's results, it uses Python's asynchronous system to run most scans asynchronously.
Raccoon supports Tor/proxy for anonymous routing. It uses default text lists (for URL lookups and subdomain detection) from the amazing SecLists repository.but various lists can be passed as arguments.
Installation
For the latest stable version:
You must reply before you can see the hidden data contained here.