Installation of 3klCon Tool on Kali Linux
Step 1:
At first,open the Kali Linux terminal and move to the desktop using the following command. On the desktop, we have to create a directory in which we will install the tool or clone the tool from GitHub.
cd Desktop/
Step 2:
Now, we are on the desktop. We will create a new directory called 3klCon using the following command.
mkdir 3klCon
Step 3:
You have created the directory 3klCon on the Desktop. Move to this directory using the following command.
cd 3klCon/
Step 4:
Now you are under 3klCon directory. Here you have to clone the 3klCon tool. GitHub To clone the tool, use the following command.
git clone https://github.com/eslam3kl/3klCon
Step 5:
Now, the tool has been cloned successfully to the 3klCon directory. Now list out the contents of the tool using the following commands.
ls
Step 6:
You can see a new directory here. 3klCon created. Move to this directory using the following command.
cd 3klcon
Step 7:
List out the content of the directory using the following command.
ls
Step 8:
We have downloaded the tool, and now we have to authorize the tool using the following command.
sudo chmod +x install_tools.sh ./install_tools.sh
Step 9:
Run the 3klcon.py file using Python
python3 3klcon.py --help
3klCon – Automation Recon Tool for Small & Medium Scopes
Reconnaissance or Information Gathering is the initial step or the starting step of the Ethical Hacking or Penetration Testing process. Knowing about the target is very important while performing penetration testing. The information about the target collected serves as the milestone while penetrating the target. Targets can be of two types 1) Organization 2) Individual, so as per the target, penetration tester should collect essential information like open ports, IP addresses, MAC Addresses, Whois Records, etc., while Social Media Account Information, Personal Details if the target is an individual.
While penetrating web-based applications, every tester should collect subdomains, service info, Web database info, information exposure, hidden directories and parameters, juicy links, which may be vulnerable.