Project

huntr

0.0
No commit activity in last 3 years
No release in over 3 years
A simple reconnaissance command-line application.
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
 Dependencies

Development

~> 1.15
~> 10.0
~> 3.0

Runtime

 Project Readme

Huntr

A simple reconnaissance command-line application with built in support for whois, ipinfo, nmap, and shodan.

Installation

$ gem install huntr

Look, a wild Geff appeared!

demo

Ran on a simulated network using pre-found responses.

Usage

To get started, create a new reconnaissance directory. This is where all the information gathered during the reconnaissance will be aggregated into a target.yaml file which will store all the information about our target including information such as domains, ip addresses and open ports.

huntr create example_dir_name

You can now change in the the example_dir_name directory where a target.yaml will exist, basically empty. Then you probably to add some target IP/DOMAIN information:

huntr targets 8.8.8.8

Inside of the target.yaml file you should now see:

---
domains:
- google-public-dns-a.google.com
ips:
- 8.8.8.8

As you can see, it has already figured out the google-public-dns-a.google.com from the 8.8.8.8 IP address. If we were to do the reverse, providing a domain, then it would also resolve the IP address of the domain for us -- if possible:

huntr targets google-public-dns-b.google.com

Inside of the target.yaml file you should now see:

---
domains:
- google-public-dns-a.google.com
- google-public-dns-b.google.com
ips:
- 8.8.8.8
- 8.8.4.4

You can mix and match the targets arguments with as many IPs and Domains as you'd like. But, once you start to figure those out, you probably want to learn more about them. There's some online web services with APIs and even some command-line tools Huntr can interface with. Let's go over those.

IpInfo

The ipinfo services provides a free API ( with limited requets per day ). You can utilize and save this information with the ipinfo command-line flag.

huntr ipinfo 8.8.8.8
Nmap

To perform an nmap scan a target, the nmap command-line flag is there for you.

huntr nmap 8.8.8.8
Shodan

The Shodan API is available if you have the SHODAN_API_KEY enviroment variable set with your shodan API key.

huntr shodan 8.8.8.8
Whois

To query the whois information for a given target, you have the whois command-line flag.

huntr whois google.com

Development

This project was built for my Ethical Hacking Reconnaissance Lab project. I didn't want to write a paper, so I wrote a command-line tool.

Nmap

To use the NMAP integration you will need to download and install nmap.

brew install nmap

Shodan API

To use the SHODAN integration you will need to sign-up and set your API key into the SHODAN_API_KEY enviroment variable of your shell either temporarily or permentently:

SHODAN_API_KEY=key...