Blue Eye a python Recon Toolkit script - 3 min read
Blue Eye is a Recon Toolkit script I made in python3. Blue Eye shows the subdomain resolves to the IP addresses, ports and headers, company email addresses and much more ..!
The Blue Eye script shows the:
- Subdomain resolves to the IP addresses
- Open Ports
- HTTP Header
- Mail Servers
- DNS Text Records
- Nameserver Records
- Sites of interest “email, okta, webmail and slack”
- Lists of GitHub user pages
- List of possible company email addresses harvested from GitHub user pages and from DuckDuckGo and Linkedin searches
The Subdomain resolves to the IP addresses.
Discovering subdomains or a domain is an essential part of hacking reconnaissance. However, having an unsecured subdomain can lead to a major serious risk. Because subdomain takeover attacks are a class of security issues where an attacker is able to seize control of an organization’s subdomain, which leads to an account takeover and much more.
It’s very useful to know an IP address of a subdomain, without having to do a lot of complicated work and to first go to ping all the subdomain names. Therefore I made Blue Eye
In another article, I will talk about the subdomain takeover and how to implement it. How to test and also to avoid them.
Mail servers can provide a wealth of information for hackers and penetration testers. Every email that is sent passes through a series of mail servers along its way to its recipient.
DNS Text Records:
The “text” record lets a domain administrator enter text into the DNS record, as it was originally intended as a place for human-readable notes. These records are used for various purposes. One example is ownership validation: To prove you own the domain, a provider may require you to add a TXT record with a particular value to your domain.
This record indicates which DNS server is authoritative for that domain (which server contains the actual DNS records). Because a domain will often have multiple NS records which can indicate primary and backup name servers for that domain. NS stands for “Name Server”
Video about Blue Eye on YouTube:
git clone https://github.com/BullsEye0/blue_eye.git cd blue_eye pip3 install -r requirements.txt
Here you can find the GitHub page:
Blue Eye a python Recon Toolkit script
IMPORTANT THINGS TO REMEMBER
- This article was written for educational purposes and pentest only.
- The author can not be held responsible for damages caused by the use of these resources.
- You will not misuse the information to gain unauthorized access.
- This information shall only be used to expand knowledge and not for causing malicious or damaging attacks.
- Just remember, Performing any hacks without written permission is illegal ..!
Read also the Disclaimer..!
If you have any questions about this article, any feedback, suggestions if you want to share your thoughts, please feel free to do it using the below comment form.