OPSEC & Legal

Operational security and legal considerations for using reconFTW responsibly.


⚠️ The Golden Rule

NEVER scan a target without explicit written authorization.

This isn't just advice—it's the law in most jurisdictions. Unauthorized scanning can result in:

  • Criminal charges

  • Civil lawsuits

  • Career damage

  • Account bans from bug bounty platforms


Authorization Checklist

Before ANY scan, verify you have:

## Pre-Scan Authorization Checklist

### Legal Authorization
- [ ] Written permission from asset owner (email, contract, or bug bounty policy)
- [ ] Scope document clearly defines in-scope assets
- [ ] Out-of-scope assets are documented and excluded
- [ ] Testing window defined (if applicable)
- [ ] Rate limits agreed upon (if any)

### Technical Preparation
- [ ] Scope file created (`-i inscope.txt`)
- [ ] Exclusions configured (`-x outofscope.txt`)
- [ ] Rate limits set appropriately
- [ ] VPS/cloud instance ready (recommended)

### Communication
- [ ] Emergency contact identified
- [ ] Reporting channel established
- [ ] NDA signed (if required)

Scan Intrusiveness Matrix

Understanding how "noisy" each mode is:

By Mode

Mode
Intrusiveness
Detection Risk
Direct Contact

-p (passive)

🟢 None

None

No

-n (OSINT)

🟢 Minimal

Very Low

Minimal

-s (subdomains)

🟡 Low

Low

DNS only

-r (recon)

🟡 Medium

Medium

Yes

-a (all)

🔴 High

High

Yes + Vuln tests

By Function

Function
Intrusiveness
Notes

sub_passive

🟢 None

Third-party APIs only

sub_crt

🟢 None

Certificate Transparency

sub_brute

🟡 Low

DNS queries

webprobe_simple

🟡 Medium

HTTP requests

screenshot

🟡 Medium

HTTP requests

fuzz

🟠 High

Many HTTP requests

nuclei_check

🔴 Very High

Active vulnerability testing

sqli

🔴 Very High

SQL injection attempts

xss

🔴 Very High

XSS payload injection

Noise Levels Explained

  • 🟢 None/Minimal: No direct target contact, uses public data

  • 🟡 Low/Medium: Standard HTTP/DNS traffic, looks like normal browsing

  • 🟠 High: Elevated traffic, may trigger WAF/IDS alerts

  • 🔴 Very High: Attack-like traffic, will likely trigger security alerts


Reducing Detection Risk

Start Passive

Use Rate Limiting

Use Scope Files

Use a VPS

Scanning from your personal IP:

  • Links activity directly to you

  • May get your home IP blocked

  • Exposes your location

Instead:


United States

Law
What It Covers

CFAA (Computer Fraud and Abuse Act)

Unauthorized access to computer systems

ECPA

Wiretapping and electronic surveillance

State laws

Vary by state

Key Points:

  • "Exceeding authorized access" is a federal crime

  • Bug bounty policies = authorization

  • Always document permission

European Union

Framework
What It Covers

GDPR

Personal data handling

NIS Directive

Network security

National laws

Vary by country

Key Points:

  • Stricter consent requirements

  • Data handling must comply with GDPR

  • Some countries require explicit contracts

United Kingdom

Law
What It Covers

Computer Misuse Act 1990

Unauthorized access

GDPR UK

Data protection

Key Points:

  • Even attempting unauthorized access is illegal

  • "With intent to commit further offences" increases penalties

General International

  • Always research local laws before testing

  • Consider both your location AND target's location

  • When in doubt, get explicit written permission


Bug Bounty Specific Guidelines

Before Testing

  1. Read the policy completely

    • Safe harbor language

    • Scope (domains, IPs, applications)

    • Out-of-scope items

    • Prohibited actions

  2. Note exclusions (common ones):

    • DoS/DDoS testing

    • Social engineering

    • Physical attacks

    • Third-party services

    • Rate limit abuse

  3. Check asset types:

    • Some exclude certain subdomains

    • API vs web app rules may differ

    • Mobile apps often have different rules

During Testing

What NOT to Do

❌ Don't
Why

Test without reading policy

Different programs, different rules

Ignore scope

Instant ban risk

Chain to access other data

May cross legal lines

Store sensitive data

GDPR/privacy issues

Share findings publicly

Violates responsible disclosure

Test production during peak hours

May cause outages


Data Handling

What reconFTW Collects

Data Type
Location
Sensitivity

Subdomains

subdomains/

Low

URLs

webs/

Low-Medium

Emails

osint/emails.txt

Medium

Leaked passwords

osint/passwords.txt

High

Vulnerabilities

vulns/

High

Screenshots

screenshots/

Medium

Security Practices

Reporting Guidelines

When you find vulnerabilities:

  1. Don't access more than necessary to prove the bug

  2. Don't exfiltrate data beyond proof

  3. Document everything (timestamps, commands, evidence)

  4. Report promptly through official channels

  5. Wait for authorization before public disclosure


Incident Response

If You Find Critical Data

If Something Breaks

If You Receive a Cease & Desist


VPS and Infrastructure OPSEC

What NOT to Do

❌ Don't
✅ Do Instead

Scan from home IP

Use cloud VPS

Reuse VPS across clients

Fresh instance per engagement

Store results on VPS long-term

Download and destroy

Use personal accounts

Create engagement-specific accounts


Quick Reference: Safe Scanning Checklist


Additional Resources


TL;DR

  1. Get written permission before any scan

  2. Start passive (-p), then go active

  3. Use rate limiting and scope files

  4. Scan from VPS, not personal IP

  5. Report responsibly, don't overstep

  6. When in doubt, ask - it's better to ask than apologize


Documentation Info Branch: dev | Version: v3.0.0+ | Last updated: February 2026

Last updated