First 30 Minutes

Get from zero to your first scan results in 30 minutes or less.


Minute 0-5: Install

# Clone and install
git clone https://github.com/six2dez/reconftw.git
cd reconftw
./install.sh

While it installs (~15-20 min): Read the next sections.


Minute 5-10: Understand What You're Running

reconFTW in One Sentence

reconFTW finds subdomains, probes them, and scans for vulnerabilities—automatically.

Available Scan Modes

reconFTW offers multiple modes for different use cases:

Mode
Flag
Description
Activity Level

Passive

-p

No direct contact with target, uses only public sources

None

Subdomains

-s

Subdomain enumeration only

Low-Medium

OSINT

-n

OSINT gathering only

Low

Web

-w

Web analysis on known subdomains

Medium

Recon

-r

Default/recommended. Full recon + light vuln scan (nuclei on webs)

Medium-High

All

-a

Full recon + aggressive vulnerability scanning

Very High

⚠️ Important: Even -r mode performs active scanning (DNS queries, HTTP requests, port scans). Always ensure you have authorization.

About the -a (All) Mode

🔴 WARNING: The -a flag runs aggressive vulnerability testing including SQLi payloads, fuzzing, and multiple scanner tools. This generates significant traffic and may trigger security alerts. Only use when you have explicit written authorization for penetration testing.

Quick Decision Tree


API keys improve results by adding more data sources. Set up at least these 3:

1. Shodan (Free tier available)

2. GitHub Token (Free)

3. SecurityTrails (Free tier)

No keys? reconFTW still works, just with fewer data sources.


Minute 15-20: Verify Installation

Common Issues

Problem
Fix

go: command not found

source ~/.bashrc or restart terminal

Tool shows ✗

Run ./install.sh again

Permission denied

chmod +x reconftw.sh


Minute 20-25: Run Your First Scan

This:

  • ✅ No direct contact with target

  • ✅ Uses only public data sources

  • ✅ Fast (~15 minutes)

  • ✅ Safe for any authorized target

Option B: Quick Subdomain Discovery

This:

  • ⚠️ Makes DNS queries (minimal noise)

  • ✅ Finds subdomains only

  • ✅ ~30 minutes

What's Happening?


Minute 25-30: Check Your Results

Where Are Results?

Quick Results Check


What's Next?

If Passive Scan Looks Good → Run Full Recon

If You Need Vulnerabilities → Run All

If Scan Was Interrupted → Just Resume


Quick Reference Card

Essential Commands

Essential Locations

What
Where

Results

Recon/<domain>/

Config

reconftw.cfg

API Keys

secrets.cfg

Logs

Recon/<domain>/.log/

Getting Help


Common First-Timer Questions

"It's taking forever"

Normal! Full scans take 1-8 hours. Use -p for quick results.

"I got rate limited"

Add to reconftw.cfg:

"Results are empty"

  1. Check target exists: dig target.com

  2. Check API keys are set

  3. Look at logs: cat Recon/target.com/.log/*.log

"Can I stop and resume?"

Yes! Just Ctrl+C to stop, run same command to resume.


🎉 You're Ready!

You now know enough to:

Next steps:

Last updated