Working with 3klCon Tool
Example :
python 3klcon.py -t hackersera.com
Tool is collecting information from various platforms and tools as I mentioned above.
Separate files are created for separate purposes, like for subdomains we have all_subdomains.txt.
We can see all the subdomains in all_subdomains.txt.
Active Subdomains are stored in active_subdomains.txt.
This tool is a multipurpose tool. It finds a lot of information about the target and saves it in a sorted manner in separate text files on a system.
3klCon – Automation Recon Tool for Small & Medium Scopes
Reconnaissance or Information Gathering is the initial step or the starting step of the Ethical Hacking or Penetration Testing process. Knowing about the target is very important while performing penetration testing. The information about the target collected serves as the milestone while penetrating the target. Targets can be of two types 1) Organization 2) Individual, so as per the target, penetration tester should collect essential information like open ports, IP addresses, MAC Addresses, Whois Records, etc., while Social Media Account Information, Personal Details if the target is an individual.
While penetrating web-based applications, every tester should collect subdomains, service info, Web database info, information exposure, hidden directories and parameters, juicy links, which may be vulnerable.
Contact Us