Concepts & Architecture
What is reconFTW?
Philosophy
Reconnaissance Methodology
Phase 1: OSINT (Open Source Intelligence)
Technique
Purpose
Tools
Phase 2: Subdomain Enumeration
Technique
Type
Description
Phase 3: Web Analysis
Phase 4: Vulnerability Scanning
Architecture Overview
Module Loading Order
Key Functions
Lifecycle Functions (core.sh)
Utility Functions (utils.sh)
Function
Purpose
Data Flow
Data Dependencies
Module
Depends On
Produces
Scan Phases
1. Initialization (start())
start())2. OSINT Phase
3. Subdomain Phase
4. Host Analysis
5. Web Analysis
6. Vulnerability Phase (if -a flag)
-a flag)7. Finalization (end())
end())Checkpoint System
How It Works
Resume Behavior
Force Re-execution
DIFF Mode
Understanding DEEP Mode
Standard vs DEEP
Aspect
Standard
DEEP
Activation
Auto-DEEP
Error Handling
Error Codes
Code
Meaning
Error Trapping
Circuit Breaker
Global Variables
Required Variables
Variable
Description
Configuration Flags
Variable
Default
Description
Visual: Architecture Diagram
OPSEC and Legal
Authorization Requirements
Pre-Scan Checklist
OPSEC Best Practices
Consideration
Recommendation
Reducing Detection Risk
Legal Risks by Region
Region
Key Laws
Notes
What to Do If Something Goes Wrong
Recommended Workflows
Bug Bounty - Standard Recon
Bug Bounty - New Program
Large Scope / Multiple Targets
Red Team / Pentest
Automated Weekly Monitoring
Quick Assessment
CI/CD Integration
Next Steps
Last updated