Red Hawk – Open Source Information Gathering and Vulnerability Scanning Tool

  • 203
  •  
  •  
  •  
  •  
  •  
  •  
  •  
    203
    Shares

Red Hawk is an open source tool that is used for information gathering and certain vulnerability scanning. Red Hawk detects Content Management Systems (CMS) in use of a target web application, IP address, web server record, Cloudflare information, and robots.txt data. Red Hawk can detect WordPress, Drupal, Joomla, and Magento CMS. Other scanning features of Red Hawk include WHOIS data collection, Geo-IP lookup, Banner grabbing, DNS lookup, port scanning, sub-domain information, reverse IP, and MX records lookup. As a vulnerability scanner,  Red Hawk looks for error based SQL injections, WordPress sensitive files, and WordPress version related vulnerabilities.

Red Hawk Installation

Red Hawk tool can be cloned from Gihtub using the following command.

git clone https://github.com/Tuhinshubhra/RED_HAWK

red hawk cloning

Using Red Hawk

After installing Red Hawk, move to the RED_HAWK directory and run rhawk.php file to launch the tool.

cd RED_HAWK
php rhawk.php

red hawk execution

The command launches the tool and asks for the target web application. Upon providing the target web address, Red Hawk gives the information gathering and vulnerability scanning options as shown in the following screenshot.

redhawk menu

Choose the desired scanning (or vulnerability assessment) option by typing the utility sequence number in the action field. The tool responds by fetching results according to the selected Red Hawk utility. For instance, we can use basic web scanning by selecting its sequence number in the following format.

[#] Choose Any Scan or Action From the Above List: 0

In response to above action, Red Hawk fetches basic web information like site title, assigned IP address, web server technology and version, cloudflare, and Robots.txt file.

basic scan

Banner grabbing task can be performed in the following format.

Banner grabbing

Similarly, we can use Red Hawk to find open ports and running services on the target web applications.

port scanning

What Bunny rating does it get?

Red Hawk can be used for information gathering purposes. Information gathering capabilities of Red Hawk are pretty reliable. However, the vulnerability scanning features of Red Hawk are not very effective. As a result we will be awarding this tool a rating of 3.5 out of 5 bunnies.

half bunny

Want to learn more about ethical hacking?

We have a  networking hacking course that is of a similar level to OSCP, get an exclusive 95% discount HERE

Do you know of another GitHub related hacking tool?

Get in touch with us via the contact form if you would like us to look at any other GitHub ethical hacking tools.

The following two tabs change content below.

Adil Adeel

I am a cyber-security enthusiast with the focus on network security, cloud security, data-driven security, and advanced cryptography. Contact me at [email protected]

Adil Adeel

I am a cyber-security enthusiast with the focus on network security, cloud security, data-driven security, and advanced cryptography. Contact me at [email protected]

Leave a Reply

Do NOT follow this link or you will be banned from the site!