Battalion
Battalion copied to clipboard
Battalion is a tool used to automate reconnaissance and assist both pentesters and internal security/admin teams.
Need to beef up the report - obviously - now that we have a good amount of raw data... aka actually generate a viable report.
User Scan currently contains the following datas: [full name] [email addresses] [company name] [~other stuff] Would like to investigate using the Twitter API to search for things like this: [In...
Do a search on crt.sh with `%.domain.tld` as the search string (might be an API available?) and use this to find possible domains missed by dnsrecon/other dns brute forcing stack
Take the output .xml file from nmap and run `searchsploit -v --nmap ` This generates a list of vulnerabilities based on NMAP output.
Sometimes, on consumer ISPs mostly, the default DNS provider will provide answers as if the target domain used a wildcard DNS entry, this leads to the domainscan taking a very...
Create flag for changing number of scavenged emails from theHarvester, this is the `-l` argument for theHarvester
Adapt domain-scan to handle edge cases when a wildcard entry is in use. There are still ways to get around the issue using other tools but it slows down the...
Nikto is a simple web vulnerability scanner which identifies interesting, misconfigured, or otherwise noteworthy features on web hosts.
Will update with additional detail after discussing with @theabraxas
This should allow Battalion to _only_ touch allowed things in case there is a specific scope to the scan.