[Defcon tool] dr_robot v1.2.2 releases: tool for Domain Reconnaissance and Enumeration
Dr. ROBOT is a tool for Domain Reconnaissance and Enumeration. By utilizing containers to reduce the overhead of dealing with dependencies, inconsistency across operating systems, and different languages, Dr. ROBOT is built to be highly portable and configurable.
Use Case: Gather as many public-facing servers that a target organization possesses. Querying DNS resources enables us to quickly develop a large list of possible targets that you can run further analysis on.
Note: Dr. ROBOT is not just a one-trick pony. You can easily customize the tools that are used gather information so that you can enjoy the benefits of using latest and greatest along with your battle-tested favorites.
There was a bug in the aggregation code that would discard any matches when the socket method could not parse for a url or find an IP. This led to empty aggregation lists. The fix for this reuses a previous commits regex in order to better parse the url and ip string sent for aggregation.
Install and Run
- Run gather using Sublist3r and Aquatone and Shodanpython drrobot.py example.domain gather -sub -aqua -shodan
- Run gather using Sublist3r with Proxy
python drrobot.py --proxy http://some.proxy:port example.domain gather -sub
- Run inspect using Eyewitness
python drrobot.py example.domain inspect -eye
- Run inspect using httpscreenshot and grabbing headers
python drrobot.py example.domain inspect -http -headers
- Run upload using Mattermost/Slack
python drrobot.py example.domain upload -matter
Copyright 2018 National Technology & Engineering Solutions of Sandia, LLC (NTESS). Under the terms of Contract DE-NA0003525 with NTESS, the U.S. Government retains certain rights in this software
Copyright (c) 2018 Sandia National Laboratories