QuickRecon: Simple Information Gathering Python Script

QuickRecon is a simple information gathering tool, that allows you to:
  • Find subdomain names
  • Perform zone transfer
  • Gather emails from Google.com and Bing.com
For those unknown, DNS zone transfer, is a type of DNS transaction that allows us to replicate the databases containing the DNS data across a set of DNS servers. Zone transfer comes in two flavors, full (opcode AXFR) and incremental (IXFR). AXFR stands for Asynchronous Full Transfer Zone and IXFR stands for Incremental Zone Transfer. This simple Python script depends on DNS toolkit ‘dnspython‘ while performing a zone transfer.


The e-mail gathering feature of this tool can also be used in a lot of ways – to learn about possible targets for account brute force, social engineering, etc.


The best part about this script is that it is cross compatible with multiple operating systems. It has been successfully tested on Windows XP and BackTrack 4 R2 with a Python 2.x installation.


Sample usage:
Obtaining subdomain names (built-in dictionary):
python quickrecon.py -m s -d example.com -o out.log


or (an external dictionary):
python quickrecon.py -m s -d example.com -i your_subdomains.txt


Zone Transfer:
python quickrecon.py -m z -d example.com


Gathering emails from Google.com and Bing.com:


python quickrecon.py -m e -d example.com -o out.log
python quickrecon.py -m e -d example.com -l 500
(quickrecon-0.2.zip) here.