Installation & Setup

This guide will walk you through installing reconFTW, setting it up, and running your first reconnaissance scan.


System Requirements

Minimum Requirements

Resource
Minimum
Recommended

OS

Ubuntu 20.04+ / Debian 11+ / Kali

Ubuntu 22.04 LTS

RAM

4 GB

8-16 GB

Disk Space

20 GB

50+ GB

CPU

2 cores

4+ cores

Network

Stable internet

High bandwidth

Supported Operating Systems

  • Ubuntu 20.04, 22.04, 24.04 (Recommended)

  • Debian 11, 12

  • Kali Linux (latest rolling)

  • Parrot OS

  • macOS 12+ (with Homebrew)

  • Docker (any platform)

  • ⚠️ Windows WSL2 (experimental)

Required Dependencies

reconFTW will install most dependencies automatically, but these base packages are required:


Installation Methods

This is the standard installation for Linux/macOS systems.

The installer will:

  1. Check system requirements

  2. Install Go, Rust, and Python dependencies

  3. Install 80+ security tools

  4. Configure PATH and environment variables

  5. Download required wordlists and resolvers

⏱️ Installation Time: 15-45 minutes depending on internet speed and system resources.

Installation Options

When running ./install.sh, you'll see these options:

Method 2: Docker Installation

Docker provides a consistent environment across all platforms.

Docker with Custom Configuration

Building Custom Docker Image

Method 3: Terraform + Ansible (Cloud Deployment)

For deploying reconFTW on AWS or other cloud providers:

See Deployment Guide for detailed cloud setup.


macOS-Specific Setup

macOS requires additional Homebrew packages due to BSD tool differences:

Note: reconFTW automatically detects macOS and uses Homebrew GNU tools. Make sure they're installed before running.


Your First Scan

Basic Reconnaissance Scan

This will:

  1. Enumerate subdomains (passive + active)

  2. Probe for live web servers

  3. Take screenshots

  4. Extract URLs and JavaScript files

  5. Run nuclei vulnerability scans

  6. Generate organized output

Understanding the Output

Results are saved in Recon/<domain>/:

Quick Scan Examples


Verifying Installation

Check Tools Installation

This displays a checklist of all required tools and their installation status.

Health Check

The health check verifies:

  • All critical dependencies are installed

  • Required files and directories exist

  • Configuration is valid

  • Network connectivity works

Dry Run Mode

Test your command without executing anything:


Updating reconFTW

Update Everything

Update Only Tools

Automatic Updates Before Scans

Enable in reconftw.cfg:


Post-Installation Configuration

After installation, you should configure API keys for maximum effectiveness:

1. Create secrets.cfg

Edit secrets.cfg:

2. Configure GitHub Tokens

Create $HOME/Tools/.github_tokens with one token per line:

Multiple tokens help avoid rate limiting during GitHub reconnaissance.

3. Verify Configuration


Common Installation Issues

"Go not found"

"Permission denied"

"Tool X not found"

See Troubleshooting for more solutions.


Next Steps

Now that reconFTW is installed:

  1. Learn the concepts - Understand how reconFTW works

  2. Explore usage options - Master command-line flags

  3. Configure settings - Customize for your needs

  4. Understand output - Interpret your results


Quick Reference Card

Last updated