Skip to content

Module 01 · Reconnaissance

Flag: --skip-recon

The reconnaissance module performs passive and semi-passive information gathering before any active scanning begins.


Sub-checks

WHOIS lookup

Queries the WHOIS database for registrar, registrant, expiry date and nameservers. Output saved to recon/whois.txt.

DNS record enumeration

Queries all major record types: A, AAAA, MX, TXT, NS, SOA, CNAME, CAA, DMARC. Output saved to recon/dns_records.txt.

SPF analysis — flags missing SPF records and dangerous +all policies:

Condition Severity
No SPF record MEDIUM
SPF uses +all HIGH
No DMARC record MEDIUM
DMARC p=none LOW

DNS Zone Transfer (AXFR)

Attempts AXFR against all discovered nameservers. A successful transfer exposes the entire DNS zone.

Condition Severity
AXFR permitted CRITICAL

Subdomain enumeration

Uses multiple tools in parallel and deduplicates results into recon/subdomains.txt:

  • subfinder — passive DNS sources (certificate transparency, DNS databases)
  • amass — passive enumeration
  • dnsrecon — standard DNS queries
  • Fallback — wordlist-based DNS brute-force (first 500 entries) if no enumeration tool is available

Google Dorks

Generates a curated list of Google Dorks for manual research — not executed automatically. Saved to recon/google_dorks.txt. Categories include: information disclosure, admin panels, credentials, config files, exposed APIs.


Tools used

Tool Role Fallback
whois WHOIS lookup None
dig DNS queries host
subfinder Passive subdomain enum Wordlist brute-force
amass Extended passive enum Optional
dnsrecon DNS standard checks Optional

Skip this module

./websec-audit.sh -t https://target.com --skip-recon

Output files

recon/
├── whois.txt
├── dns_records.txt
├── axfr.txt
├── subfinder.txt
├── amass.txt
├── dnsrecon.json
├── subdomains.txt          # deduplicated, used by Module 14
├── whatweb.json
├── waf_detection.txt
└── google_dorks.txt