Ethical Hacking News Hubb
Advertisement Banner
  • Home
  • News
  • Ethical Hackers
  • Contact
No Result
View All Result
  • Home
  • News
  • Ethical Hackers
  • Contact
No Result
View All Result
Wellnessnewshubb
No Result
View All Result
Home News

ReconPal – Leveraging NLP For Infosec

admin by admin
August 26, 2022
in News




Recon is one of the most important phases that seem easy but takes a lot of effort and skill to do right. One needs to know about the right tools, correct queries/syntax, run those queries, correlate the information, and sanitize the output. All of this might be easy for a seasoned infosec/recon professional to do, but for rest, it is still near to magic. How cool it will be to ask a simple question like “Find me an open Memcached server in Singapore with UDP support?” or “How many IP cameras in Singapore are using default credentials?” in a chat and get the answer?

The integration of GPT-3, deep learning-based language models to produce human-like text, with well-known recon tools like Shodan, is the foundation of ReconPal. ReconPal also supports using voice commands to execute popular exploits and perform reconnaissance.

Built With

  • OpenAI GPT-3
  • Shodan API
  • Speech-to-Text
  • Telegram Bot
  • Docker Containers
  • Python 3

To get ReconPal up and running, follow these simple steps.

Prerequisites

Installation

  1. Clone the repo

    git clone https://github.com/pentesteracademy/reconpal.git
  2. Enter your OPENAI, SHODAN API keys, and TELEGRAM bot token in docker-compose.yml

    Start reconpal

Open the telegram app and select the created bot to use ReconPal.

  1. Click on start or just type in the input box.
  1. Register the model.
  1. Test the tool with some commands.

Jeswin Mathai, Senior Security Researcher, INE [email protected]

Nishant Sharma, Security Research Manager, INE [email protected]

Shantanu Kale, Cloud Developer, INE [email protected]

Sherin Stephen, Cloud Developer, INE [email protected]

Sarthak Saini (Ex-Pentester Academy)

For more details, refer to the “ReconPal.pdf” PDF file. This file contains the slide deck used for presentations.

Starting reconpal and registering model

Finder module in action

Scanner module in action

Attacker module in action

Voice Support

This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License v2 as published by the Free Software Foundation.

This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.

You should have received a copy of the GNU General Public License along with this program. If not, see http://www.gnu.org/licenses/.





Source link

Tags: cybersecurityethical hackinghack androidhack apphack wordpresshacker newshackinghacking tools for windowskeyloggerkitkitploitpassword brute forcepenetration testingpentestpentest androidpentest linuxpentest toolkitpentest toolsspy tool kitspywaretools
Previous Post

Hackers Breach LastPass Developer System to Steal Source Code

Next Post

How to Watch Guilt Season 2 Online for Free

Next Post

How to Watch Guilt Season 2 Online for Free

Recommended

What Makes ICS/OT Infrastructure Vulnerable?

5 months ago

What is RFID blocking? Your questions answered

3 weeks ago

© 2022 Ethical Hacking News Hubb All rights reserved.

Use of these names, logos, and brands does not imply endorsement unless specified. By using this site, you agree to the Privacy Policy and Terms & Conditions.

Navigate Site

  • Home
  • News
  • Ethical Hackers
  • Contact

Newsletter Sign Up.

No Result
View All Result
  • Home
  • News
  • Ethical Hackers
  • Contact

© 2022 Ethical Hacking News Hubb All rights reserved.