Output Interpretation

Understanding reconFTW's output structure and how to interpret results is crucial for effective reconnaissance.


Output Directory Structure

When you run a scan against example.com, reconFTW creates:

Recon/
└── example.com/
    ├── subdomains/           # Subdomain enumeration results
    ├── webs/                 # Web probing and analysis
    ├── hosts/                # IP and port scanning
    ├── osint/                # OSINT findings
    ├── vulns/                # Vulnerability scan results
    ├── nuclei_output/        # Nuclei JSON results
    ├── fuzzing/              # Directory/file fuzzing
    ├── js/                   # JavaScript analysis
    ├── screenshots/          # Web screenshots
    ├── .tmp/                 # Temporary files
    ├── .log/                 # Execution logs
    ├── .called_fn/           # Checkpoint markers
    ├── assets.jsonl          # Automation-friendly asset list
    └── hotlist.txt           # Risk-scored findings

Subdomain Files (subdomains/)

subdomains.txt

Content: Final deduplicated list of discovered subdomains.

Format: One subdomain per line.

Use Cases:

  • Input for further enumeration

  • Scope verification

  • Asset inventory


subdomains_crt.txt

Content: Subdomains from Certificate Transparency logs.

Source: crt.sh queries


subdomains_dnsrecords.txt

Content: DNS records for resolved subdomains.

Format: Subdomain with record types.


subdomains_noerror.txt

Content: Subdomains discovered via DNS NOERROR response.

Technique: DNS response code analysis.


subdomains_permut.txt

Content: Subdomains found via permutation techniques.


subdomains_recursive.txt

Content: Subdomains from recursive enumeration.


subdomains_scraping.txt

Content: Subdomains extracted from web scraping.


Web Files (webs/)

webs.txt

Content: Live web servers (HTTP 200/30x responses).

Format: Full URLs.

Use Cases:

  • Target list for vulnerability scanning

  • Web application testing

  • Screenshot generation


webs_all.txt

Content: All probed URLs with HTTP response data.

Format: URL with metadata.


url_extract.txt

Content: All discovered URLs from crawling and archives.

Sources: gau, waybackurls, katana, hakrawler


takeover.txt

Content: Potential subdomain takeover vulnerabilities.

Format: Subdomain with service info.

Action Required: Verify and claim vulnerable subdomains.


url_gf/

Content: URLs categorized by vulnerability patterns.

Files:

  • xss.txt - XSS candidates

  • sqli.txt - SQL injection candidates

  • ssrf.txt - SSRF candidates

  • lfi.txt - LFI candidates

  • redirect.txt - Open redirect candidates

  • rce.txt - RCE candidates

  • idor.txt - IDOR candidates

Example (xss.txt):


url_extensions/

Content: URLs grouped by file extension.

Files:

  • url_pdf.txt

  • url_doc.txt

  • url_js.txt

  • url_json.txt

  • url_xml.txt

  • url_config.txt


Host Files (hosts/)

ips.txt

Content: All resolved IP addresses (non-CDN).


cdn.txt

Content: IP addresses identified as CDN.


portscan_passive.txt

Content: Port scan results from Shodan.


portscan_active.txt

Content: Active nmap scan results.

Format: Standard nmap output.


portscan_active.xml

Content: Nmap results in XML format.

Use Cases:

  • Import to vulnerability scanners

  • Parse with scripts

  • Import to Faraday


portscan_active.gnmap

Content: Nmap greppable format.


waf.txt

Content: WAF detection results.


geo.txt

Content: IP geolocation data.


OSINT Files (osint/)

dorks.txt

Content: Google dork results.


emails.txt

Content: Discovered email addresses.


passwords.txt

Content: Leaked credential data.

Format: Email:password pairs (from breach databases).

⚠️ IMPORTANT: Handle with care, sensitive data.


metadata_results.txt

Content: Document metadata extraction.


github_company_secrets.json

Content: Secrets found in GitHub repositories.

Format: JSON with file locations and secret types.


apileaks.txt

Content: API endpoints from Postman/Swagger leaks.


domain_info.txt

Content: WHOIS and domain intelligence.


spf_dmarc.txt

Content: Email security analysis.


Vulnerability Files (vulns/)

nuclei_output/

Content: Nuclei scan results in JSON format.

Files:

  • nuclei_critical.json

  • nuclei_high.json

  • nuclei_medium.json

  • nuclei_low.json

  • nuclei_info.json

Sample JSON:


xss.txt

Content: XSS vulnerability findings.


sqli.txt

Content: SQL injection findings.


ssrf.txt

Content: SSRF vulnerability findings.


cors.txt

Content: CORS misconfiguration findings.


redirect.txt

Content: Open redirect findings.


lfi.txt

Content: Local File Inclusion findings.


testssl.txt

Content: SSL/TLS analysis results.


JavaScript Files (js/)

js_files.txt

Content: Discovered JavaScript file URLs.


js_secrets.txt

Content: Secrets found in JavaScript files.


js_endpoints.txt

Content: API endpoints extracted from JavaScript.


Fuzzing Files (fuzzing/)

fuzzing_full.txt

Content: All fuzzing results combined.


fuzzing_{subdomain}.txt

Content: Per-subdomain fuzzing results.


Screenshots (screenshots/)

Content: Web page screenshots.

Format: PNG images named by URL hash.

Files:

  • https_www.example.com.png

  • https_api.example.com.png

  • http_dev.example.com_8080.png

Gallery View: Use gowitness report for HTML gallery.


Log Files (.log/)

reconftw.log

Content: Main execution log.


errors.log

Content: Error messages during execution.


Checkpoint Files (.called_fn/)

Content: Function completion markers for checkpoint/resume.

Files:

Purpose: Resume interrupted scans from last checkpoint.


Special Files

assets.jsonl

Content: Automation-friendly asset list in JSON Lines format.

Format:

Use Cases:

  • Pipeline integration

  • Custom tooling

  • Data analysis


hotlist.txt

Content: Risk-scored priority targets.

Format: Assets with risk indicators.


Interpreting Nuclei Results

Severity Levels

Severity
Description
Action

Critical

Immediate exploitation possible

Report immediately

High

Significant security impact

Prioritize remediation

Medium

Moderate risk

Schedule fix

Low

Minor issues

Best practice

Info

Informational

Document

Reading Nuclei JSON

Key Fields:

  • template-id: Template identifier

  • severity: Risk level

  • host: Target URL

  • matched-at: Exact vulnerable endpoint

  • extracted-results: Evidence of vulnerability

  • curl-command: Reproduction command


Report Generation

AI-Generated Reports

Report Types:

  • detailed - Technical deep-dive

  • executive - High-level summary

  • compliance - Compliance-focused

Manual Report Creation

  1. Collect key findings from:

    • vulns/nuclei_output/

    • webs/takeover.txt

    • osint/github_company_secrets.json

  2. Prioritize by severity

  3. Include reproduction steps from curl commands


Data Export

Export to CSV

Export to Faraday

Automatic when FARADAY is enabled. Results imported to workspace.

Export to JSON

Most output files have JSON equivalents in .tmp/ directory.


Cleanup

Temporary Files

Reset Checkpoints

Full Clean


Next Steps

Last updated