Yotter – Bash Script that performs Recon
Yotter tool is an automated tool used in the phase of Web Information Gathering and Fingerprinting. Yotter tool can perform Recon like Finding the target IPs, Finding the target IP ranges, detecting the subdomains from various online sites also brute-force for subdomains, and performing Port scanning on the target domain. Yotter tool performs brute-forcing of around 250 checks per second which is an understanding performance. Yotter tool is developed in the Shell language and it’s available on GitHub for free.
Installation of Yotter Tool on Kali Linux OS
Step 1: Use the following command to install the tool in your Kali Linux operating system.
git clone https://github.com/b3rito/yotter.git
Step 2: Now use the following command to move into the directory of the tool. You have to move in the directory in order to run the tool.
Step 3: Change the permissions of the yotter.sh file by using the following command.
sudo chmod 777 yotter.sh
Step 4: Run the below command to verify the installation.
Working with Yotter Tool on Kali Linux OS
Example/Usage: Scanning on geeksforgeeks.org domain
./yotter.sh -t geeksforgeeks.org -d /usr/share/wordlists/dirb/small.txt -s 1000
We have displayed the contents of word lists from which the directories will be brute-forced.
Our fuzzing process is been started on the target domain geeksforgeeks.org.
Yotter tool has recognized the IP address and the IP range of the geeksforgeeks.org domain.
The tool has got the subdomains of geeksforgeeks.org.
Now, Yotter will perform Port scanning on the target domain.
We have skipped the port scan and directly launched the fuzzing process.
Yotter has started the fuzzing process.