Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      How To Prevent WordPress SQL Injection Attacks

      June 12, 2025

      Java never goes out of style: Celebrating 30 years of the language

      June 12, 2025

      OpenAI o3-pro available in the API, BrowserStack adds Playwright support for real iOS devices, and more – Daily News Digest

      June 12, 2025

      Creating The “Moving Highlight” Navigation Bar With JavaScript And CSS

      June 11, 2025

      Surface Pro 11 with Snapdragon X Elite drops to lowest price ever

      June 12, 2025

      With WH40K Boltgun and Dungeons of Hinterberg, this month’s Humble Choice lineup is stacked for less than $12

      June 12, 2025

      I’ve been loving the upgrade to my favorite mobile controller, and there’s even a version for large tablets

      June 12, 2025

      Copilot Vision just launched — and Microsoft already added new features

      June 12, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Master Data Management: The Key to Improved Analytics Reporting

      June 12, 2025
      Recent

      Master Data Management: The Key to Improved Analytics Reporting

      June 12, 2025

      Salesforce Lead-to-Revenue Management

      June 12, 2025

      React Native 0.80 – React 19.1, JS API Changes, Freezing Legacy Arch and much more

      June 12, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Surface Pro 11 with Snapdragon X Elite drops to lowest price ever

      June 12, 2025
      Recent

      Surface Pro 11 with Snapdragon X Elite drops to lowest price ever

      June 12, 2025

      With WH40K Boltgun and Dungeons of Hinterberg, this month’s Humble Choice lineup is stacked for less than $12

      June 12, 2025

      I’ve been loving the upgrade to my favorite mobile controller, and there’s even a version for large tablets

      June 12, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Learning Resources»AutoRecon — Best Tool for Bug Bounty & CTF

    AutoRecon — Best Tool for Bug Bounty & CTF

    June 6, 2025

    So, we all have searched for hacking tools that can magically find vulnerabilities in a website or server. Almost every beginner in cybersecurity wants to find a tool that automates the entire process, so they can sit back and watch the results. After finishing this tutorial, we will have a clear idea of AutoRecon, an amazing automated reconnaissance tool. Not just for bug bounty hunters, this tool is useful for penetration testers, ethical hackers, and even those who are just curious about how reconnaissance works. This tool helped a lot everyone in OSCP and in the HackTheBox.

    Find vulnerabilities using Autorecon on Kali Linux

    The Truth About Automated Recon

    First of all, let’s be clear—there’s no “one-click hacking tool” that will instantly find and exploit vulnerabilities like in movies. But when we search for automated recon tools, we see a flood of scripts and frameworks claiming to do everything. If we believe in those “magic hack” tools, congratulations—we’ve unlocked a higher level of foolishness.

    AutoRecon is not a hacking tool that will instantly pop a shell on a target. It is a powerful reconnaissance tool that helps ethical hackers gather information efficiently. If we know how to use it correctly, it will make our job easier, but it won’t do everything for us. In this detailed article we are going to install AutoRecon on our Kali Linux system and we will se some use of it.

    Installing AutoRecon on Kali Linux

    Installing AutoRecon on Kali Linux is very easy, cause it comes with Kali Linux repository. So we just need to apply following command for a hassle-free installation:

    sudo apt install autorecon -y

    The following screenshot shows the output of applied command.

    Installing AutoRecon on Kali Linux

    In our case it prompt for some libraries to restart. Here we just need to press the TAB button and Enter Key (If doesn’t work then re-logging or restarting the system is an option).

    Autorecon wants some libraries to restart

    Now we are ready to use the AutoRecon on our Kali Linux system.

    Using AutoRecon on Kali Linux

    Now the last thing to do. We just need to run AutoRecon against a target. For just an example we are running it on to our localhost server. Here our target address is 1227.10.0.1 (on real life based target this thing could be like something.com). We just need to apply simple command as following:

    sudo autorecon 127.10.0.1

    It will start the process automatically as we can see in the following screenshot:

    autocon working on Kali Linux

    After giving it a decent amount of time it completes it’s scanning process. Then we have to find the search results. Autorecon automatically creates a directory called “results” where in which directory it was running. So after the scanning process is done we need to go to the results directory by command line (or by using mouse clicks on file manager). in the results directory we can find another directory (named after our target’s URL) where all the scan results are stored. On the following screenshot we just showed the CVE’s we found on our target, but there are lot of good stuffs are out there. We are not going to spoonfeed everything. Try them out. We are just showing that we found some vulnerabilities on our target as we can see in the following screenshot:

    autorecon finds vulnerabilities

    This is how we can easily found various information even vulnerabilities on our targeted website using AutoRecon on our Kali Linux system. AutoRecon is very useful tool for bug bounty hunters, cybersecurity researchers and OSCP students.

    Enjoy our articles? Make sure to follow us on Twitter and GitHub, we post article updates there. To join our KaliLinuxIn family, join our Telegram Group & Whatsapp Channel. We are striving to build a community for Linux and cybersecurity. For anything we always happy to help everyone on the comment section and on Telegram Group. As we know our comment section is always open to everyone. We read each and every comment and we always reply.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleSSLyze — Find Mis-Configuration on SSL
    Next Article Best USB WiFi Adapter For Kali Linux 2025 [Updated March]

    Related Posts

    News & Updates

    Surface Pro 11 with Snapdragon X Elite drops to lowest price ever

    June 12, 2025
    News & Updates

    With WH40K Boltgun and Dungeons of Hinterberg, this month’s Humble Choice lineup is stacked for less than $12

    June 12, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    GraphQL API Testing: Strategies and Tools for Testers

    Development

    CVE-2024-12093 – GitLab SAML XPath Validation Bypass

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-45864 – TOTOLINK A3002R Buffer Overflow Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    A Closer Look at the AI Assistant of Oracle Analytics

    Development

    Highlights

    CVE-2025-5952 – Zend.To OS Command Injection

    June 10, 2025

    CVE ID : CVE-2025-5952

    Published : June 10, 2025, 5:15 a.m. | 28 minutes ago

    Description : A vulnerability, which was classified as critical, has been found in Zend.To up to 6.10-6 Beta. This issue affects the function exec of the file NSSDropoff.php. The manipulation of the argument file_1 leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 6.10-7 is able to address this issue. It is recommended to upgrade the affected component. This affects a rather old version of the software. The vendor recommends updating to the latest release.

    Severity: 7.3 | HIGH

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Solving the mystery of how an ancient bird went extinct

    May 13, 2025

    CVE-2025-35007 – Microhard BulletLTE-NA2/IPn4Gii-NA2 Command Injection Vulnerability

    June 8, 2025

    melonDS is an Nintendo DS and DSi emulator

    April 7, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.