Open Access Open Access  Restricted Access Subscription Access

WEB EXTENSION FOR RECON

Priyanka K, Yuvan Krishna P, Ajay Kumar JS, Dharun J, Rooban N, Vinayagamoorthy N

Abstract


This paper presents a browser extension designed to automate fundamental reconnaissance activities directly within the web browser environment. The extension dynamically captures the URL of the currently active webpage and systematically executes a suite of reconnaissance operations, including subdomain enumeration, HTTP header analysis, DNS resolution, port scanning . By integrating these capabilities natively into the browser, the tool enables security researchers and ethical hackers to rapidly access critical reconnaissance insights without reliance on external utilities or complex configurations. Emphasizing usability, efficiency, and automation, this solution transforms routine webpage visits into immediate opportunities for comprehensive vulnerability assessment, significantly simplifying the initial phases of security analysis.


Full Text:

PDF

References


Redrowthu Ph.D, Vijaya & Ahmed, Iftequar & Reddy, Sriveda & Akshay, S & Reddy, Vrushik & Reddy, Sanjana. (2022). Automation of Recon Process for Ethical Hackers. 1-6. Odun-Ayo, Isaac. (2021).

A Review of Common Tools and Techniques for Reconnaissance Attacks.. Proceedings of the. 141-157. 10.22624/AIMS/iSTEAMS-2021/V28P11.

A.G. Bacudio, X. Yuan, B.T.B.Chu and M. Jones. “An Overview of Penetration Testing”. Int. Journal of Network Security & Its Applications Vol.3 (no. 6) (2021, November)

H. P. Sanghvi and M. S. Dahiya, "Cyber Reconnaissance: An Alarm before Cyber Attack," International Journal of Computer Applications, pp. 36-38, 2013.

Sanya Bindlish, Mehak Khurana, "RECON Tool: An Automation of Reconnaissance & Scanning" IJCRT Vol 9 issue 8 Aug 2021.

Nagendran K, Adithyan A, Chethana R, Camillus P, Bala Sri Varshini K B. “Web Application Penetration Testing”. International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-8 Issue-10 (2019, August 10)

Kathrine, G. Jaspher & Joseph, Ronnie & Veemaraj, Ebenezer. (2020). COMPARATIVE ANALYSIS OF SUBDOMAIN ENUMERATION TOOLS AND STATIC CODE ANALYSIS. 15. 158-173.

Adam, Helmi & Widyawan, Widyawan & Putra, Guntur. (2023). A Review of Penetration Testing Frameworks, Tools, and Application Areas. 319-324. 10.1109/ICITISEE58992.2023.10404397.

Bell, K., Hong, J., McKeown, N. and Voss, C., 2021. The Recon Approach: A new direction for machine learning in criminal law. Berkeley Tech. LJ, 36, p.821.

Mazurczyk, Wojciech & Caviglione, Luca. (2021). Cyber Reconnaissance Techniques. Communications of the ACM. 64. 10.1145/3418293.


Refbacks

  • There are currently no refbacks.