FAQ

Common questions and answers about reconFTW.


General Questions

What is reconFTW?

reconFTW is an automated reconnaissance framework that orchestrates 80+ security tools to perform full reconnaissance on targets. It's designed for bug bounty hunters, penetration testers, and security researchers.

Is reconFTW free?

Yes, reconFTW is completely free and open source under the MIT license.

What operating systems are supported?

  • Linux (Ubuntu/Debian recommended) - Full support

  • macOS - Supported with GNU tools installed via Homebrew

  • Windows - Via WSL2 (Windows Subsystem for Linux)

Do I need root/sudo access?

Only for the initial installation of system dependencies. Normal scans run without elevated privileges.


Installation Questions

How long does installation take?

Initial installation typically takes 15-30 minutes depending on your internet connection and system speed. Most time is spent downloading and compiling Go tools.

Can I install on a VPS?

Yes! VPS deployment is recommended for large scans. See the Deployment Guide for detailed instructions.

Which cloud provider is best?

Any provider works. Popular choices:

  • DigitalOcean - Simple, good pricing

  • Linode - Good performance

  • Hetzner - Best value in Europe

  • AWS/Azure - Enterprise features

How do I update reconFTW?

Tools aren't installing, what do I do?

  1. Ensure Go is properly installed: go version

  2. Check PATH includes Go bin: echo $PATH | grep go

  3. Run installer again: ./install.sh

  4. Check specific tool: which httpx


Usage Questions

What scan modes are available?

reconFTW has several modes for different scenarios:

Flag
Mode
What It Does
Use Case

-p

Passive

Uses only public data sources, no direct target contact

Safe first scan, stealth

-s

Subdomains

Subdomain enumeration (passive + active)

Quick subdomain discovery

-n

OSINT

OSINT gathering only (dorks, emails, leaks)

Information gathering

-w

Web

Web analysis on existing subdomains

Analyze known assets

-r

Recon

Full reconnaissance + light nuclei scan

Default, recommended

-a

All

Full recon + aggressive vulnerability scanning

Full pentest (see warning)

-c

Custom

Run a single specific function

Advanced users

What's the difference between -r and -a?

-r (Recon) is the recommended default mode. It performs:

  • Full subdomain enumeration (passive + active)

  • Web probing, screenshots, JS analysis

  • URL collection and parameter discovery

  • Light vulnerability scanning (nuclei on discovered webs/domains)

  • Port scanning

⚠️ Note: -r mode IS active scanning. It sends HTTP requests, DNS queries, and runs nuclei templates. It generates traffic to the target.

-a (All) adds aggressive vulnerability testing:

  • SQLi testing with SQLMap/Ghauri

  • XSS fuzzing with Dalfox

  • SSRF, LFI, SSTI, command injection checks

  • Directory fuzzing

  • All nuclei templates including intrusive ones

🔴 WARNING: The -a flag is the "YOLO mode". It sends attack payloads to the target. Only use with explicit written authorization for penetration testing. This mode may trigger WAFs, get your IP blocked, or cause service disruption.

How do I scan multiple domains?

Create a file with one domain per line:

Then run:

Can I resume an interrupted scan?

Yes! Simply run the same command again. reconFTW uses checkpoints to skip completed functions.

How do I force a full rescan?

Delete the checkpoint directory:

How do I run only specific functions?

Use the -c flag:

-c accepts a single function per run. To execute multiple functions, run separate commands.

What does DEEP mode do?

DEEP mode runs additional, more intensive checks when the number of assets is below a threshold. It's controlled by DEEP_LIMIT in the config. See Performance Tuning for details.


Configuration Questions

Where is the config file?

The main configuration file is reconftw.cfg in the reconftw directory. See Configuration Reference for all options.

Where do I put API keys?

Create a secrets.cfg file (it's gitignored for security):

How do I change thread counts?

Edit reconftw.cfg:

For Nuclei speed, use NUCLEI_RATELIMIT.

How do I use a custom wordlist?

How do I exclude certain subdomains?

Create an out-of-scope file:

Then run:


Output Questions

Where are results saved?

Results are saved in the Recon/ directory. See Data Model & I/O for the complete output structure:

What format are vulnerability results in?

Nuclei results are saved in JSON format in vulns/nuclei_output/:

  • nuclei_critical.json

  • nuclei_high.json

  • nuclei_medium.json

  • etc.

How do I generate a report?

Enable AI reports:

Or manually aggregate results from the output files.

Can I export to CSV?

Results can be converted:


Performance Questions

How long does a full scan take?

Depends on target size:

  • Small target (< 100 subdomains): 30-60 minutes

  • Medium target (100-1000 subdomains): 2-4 hours

  • Large target (1000+ subdomains): 4-12+ hours

How do I speed up scans?

  1. Use Axiom for distributed scanning (see Axiom Integration)

  2. Increase threads in config (see Performance Tuning)

  3. Use passive mode (-p) for quick results

  4. Skip modules you don't need

Why is my scan slow?

Common causes:

  • Large number of subdomains (normal)

  • Rate limiting by target

  • Slow DNS resolvers

  • Limited system resources

Solutions:

  • Use validated resolvers

  • Reduce rate limits to avoid blocks

  • Increase VPS resources

  • Enable DEEP mode limits

How much disk space do I need?

  • Small scans: 1-5 GB

  • Medium scans: 5-20 GB

  • Large scans: 20-100+ GB

Monitor with: du -sh Recon/example.com/


Axiom Questions

What is Axiom?

Axiom is a tool that lets you distribute reconFTW across multiple cloud instances for faster scanning. See Axiom Integration for full details.

Do I need Axiom?

No, Axiom is optional. It's useful for:

  • Very large targets

  • Time-sensitive engagements

  • Regular/automated scanning

How do I enable Axiom?

  1. Install Axiom: bash <(curl -s https://raw.githubusercontent.com/pry0cc/axiom/master/interact/axiom-configure)

  2. Configure cloud provider

  3. Run reconFTW with -v flag: ./reconftw.sh -d example.com -a -v

How much does Axiom cost?

Axiom itself is free. You pay for cloud instances:

  • ~$0.07/hour for a 10-instance fleet

  • A typical scan costs $0.15-0.50


reconFTW is a legal tool. However, using it against targets without authorization is illegal. Always:

  • Get written permission before testing

  • Stay within defined scope

  • Follow responsible disclosure

Can I use it for bug bounties?

Yes! reconFTW is designed for bug bounty hunting. See OPSEC & Legal and Case Studies for detailed guidance. Always:

  • Read the program's rules carefully

  • Respect rate limits

  • Stay in scope

  • Report responsibly

What about rate limiting and being blocked?

To avoid issues (see OPSEC & Legal):

  • Use reasonable rate limits

  • Respect robots.txt (optional, configurable)

  • Don't scan during business hours if concerned

  • Use the -p (passive) flag for initial recon


Troubleshooting

Where can I get help?

  • GitHub Issues: https://github.com/six2dez/reconftw/issues

  • Discord: https://discord.gg/R5DdXVEdTy

  • Telegram: https://t.me/joinchat/H5bAaw3YbzzmI5co

How do I report a bug?

Open a GitHub issue with:

  1. reconFTW version: git rev-parse --abbrev-ref HEAD and git describe --tags 2>/dev/null || git rev-parse --short HEAD

  2. Operating system

  3. Full error message

  4. Steps to reproduce

Where are the logs?

Logs are in the scan directory:


More Questions?

If your question isn't answered here:

  1. Open a new GitHub issue

Last updated