Reconnaissance & OSINT Automation
🔍 Reconnaissance & OSINT Automation
Overview
This skill enables Claude to assist with comprehensive reconnaissance and open-source intelligence (OSINT) gathering during security assessments. It covers passive and active reconnaissance techniques, subdomain enumeration, port scanning, DNS analysis, technology fingerprinting, and OSINT data correlation.
⚠️ Important: Always obtain proper authorization before performing reconnaissance against any target. Unauthorized scanning is illegal in most jurisdictions.
Prerequisites
Required
- Python 3.8+
requests,dnspython,python-whois,beautifulsoup4,shodan
Optional (Enhanced Capabilities)
- Nmap — Active port scanning and service detection
- Amass — Advanced subdomain enumeration
- Subfinder — Passive subdomain discovery
- theHarvester — Email and subdomain harvesting
- Shodan API key — Internet-wide device search
- Censys API key — Certificate and host search
pip install requests dnspython python-whois beautifulsoup4 shodan censys
Core Capabilities
1. Subdomain Enumeration
- Passive subdomain discovery using certificate transparency logs
- DNS brute-force enumeration with customizable wordlists
- Recursive subdomain discovery
- Wildcard detection and filtering
- Result deduplication and validation
When the user asks to enumerate subdomains:
- Start with passive methods (CT logs, DNS records, search engines)
- Validate discovered subdomains via DNS resolution
- Optionally perform active brute-force enumeration
- Detect wildcard DNS and filter false positives
- Resolve all valid subdomains to IP addresses
- Group results by IP for infrastructure mapping
- Output results in structured JSON format
2. Port Scanning & Service Detection
- TCP SYN/Connect scanning
- UDP scanning for critical services
- Service version detection
- OS fingerprinting
- Banner grabbing
- Rate-limited scanning to avoid detection
When the user asks to scan ports:
- Determine scan scope (single host, subnet, list)
- Select appropriate scan technique based on authorization level
- Perform service version detection on open ports
- Identify potential vulnerabilities based on service versions
- Generate structured scan report
3. DNS Reconnaissance
- DNS record enumeration (A, AAAA, MX, NS, TXT, SOA, SRV, CNAME)
- Zone transfer attempts (AXFR)
- DNS cache snooping
- Reverse DNS lookups
- SPF/DKIM/DMARC analysis for email security posture
- DNS history and passive DNS lookups
When the user asks for DNS recon:
- Enumerate all DNS record types for the target domain
- Attempt zone transfers on all nameservers
- Analyze SPF, DKIM, and DMARC records
- Perform reverse DNS on discovered IPs
- Check for DNS misconfigurations
- Document findings with security implications
4. Technology Fingerprinting
- Web technology identification (CMS, frameworks, libraries)
- HTTP header analysis
- SSL/TLS certificate analysis
- WAF detection
- CDN identification
- JavaScript library version detection
When the user asks to fingerprint technologies:
- Analyze HTTP response headers
- Parse HTML for framework indicators
- Check for common CMS signatures
- Analyze JavaScript includes and their versions
- Detect WAF presence and type
- Check SSL certificate details
- Generate technology stack profile
5. OSINT Gathering
- Email address discovery and validation
- Social media profile correlation
- Domain WHOIS analysis
- Company infrastructure mapping
- Leaked credential checking (via public APIs)
- Metadata extraction from public documents
- Google dorking query generation
When the user asks for OSINT:
- Gather WHOIS information for domains
- Search certificate transparency logs
- Discover email addresses associated with the domain
- Generate and execute Google dork queries
- Check for exposed services and data
- Correlate findings across multiple sources
- Present findings with confidence levels
Usage Instructions
Basic Reconnaissance Workflow
Step 1: Define target scope and authorization
Step 2: Passive reconnaissance (OSINT, DNS, CT logs)
Step 3: Subdomain enumeration
Step 4: Port scanning and service detection
Step 5: Technology fingerprinting
Step 6: Consolidate and report findings
Example Prompts
> Enumerate all subdomains for example.com using passive methods
> Perform a full DNS reconnaissance of target.org
> Fingerprint the technology stack of https://target.com
> Generate Google dork queries for finding exposed files on example.com
> Scan the top 1000 ports on 192.168.1.0/24
Integration Guide
Chaining with Other Skills
- → Vulnerability Scanner (02): Feed discovered hosts and services into vulnerability scanning
- → Web Security (09): Pass discovered web applications for security testing
- → Network Security (08): Use scan results for network architecture mapping
- → Cloud Security (10): Identify cloud-hosted assets for cloud-specific auditing
Output Formats
All scripts output structured JSON by default, compatible with:
- SIEM ingestion
- Custom reporting pipelines
- Other skill scripts
Script Reference
subdomain_enum.py
Passive and active subdomain enumeration with validation.
python scripts/subdomain_enum.py --domain target.com --output results.json
python scripts/subdomain_enum.py --domain target.com --wordlist wordlist.txt --threads 20
python scripts/subdomain_enum.py --domain target.com --passive-only
dns_recon.py
Comprehensive DNS reconnaissance and analysis.
python scripts/dns_recon.py --domain target.com --output dns_report.json
python scripts/dns_recon.py --domain target.com --check-zone-transfer
tech_fingerprint.py
Web technology fingerprinting and stack identification.
python scripts/tech_fingerprint.py --url https://target.com --output tech_report.json
python scripts/tech_fingerprint.py --urls urls.txt --output tech_report.json
References
More from masriyan/claude-code-cybersecurity-skill
reverse engineering & binary analysis
Binary analysis, disassembly, decompilation, firmware RE, and protocol reverse engineering
10incident response & digital forensics
IR playbook execution, evidence collection, timeline analysis, memory forensics, and post-incident reporting
10cryptographic analysis & assessment
Cipher identification, SSL/TLS auditing, hash analysis, key strength assessment, and crypto implementation review
10exploit development & payload engineering
Proof-of-concept development, payload crafting, shellcode generation, and exploitation techniques
10vulnerability scanning & assessment
Automated vulnerability scanning, CVE detection, dependency auditing, and security configuration assessment
7cloud security & container hardening
AWS/Azure/GCP security auditing, container hardening, IaC scanning, and Kubernetes security
7