Working with BlackDragon Tool on Kali Linux OS
Example: Scanning w3wiki.org domain
./Black-Dragon w3wiki.org
Subdomain Enumeration is performed using subfinder tool.
Fast Scan Mode is performed using the Knockpy tool.
Passive Recon is performed on w3wiki.org using Amass tool.
Active Recon is performed on w3wiki.org using Amass tool.
Results of Amass are shown in the below screenshot.
BlackDragon – Advanced Automation Tool For Web-Recon
Information Gathering is the process of collecting the relevant information about the target domain for increasing the scope of testing. This information consists of Subdomain Enumeration, Live Host identification, etc. This phase can be completed in an automated way. Black-Dragon is the tool used in the Web-App Information Gathering, which makes it easier to gather information about our target. Black-Dragon tool is developed in Shell Script and available on the GitHub platform, it’s open-source and free to use. Black-Dragon tool will help us in our Bug Hunting Or Web Penetration Testing Operation because it not only gathers information about the target but also arranges all this information in a structured way which makes you analyze the data in a good way.
Contact Us