ReNgine upgrade: New subscan feature, PDF reports, expanded toolbox showcased at Black Hat USA

Open supply recon instrument automates among the extra time-consuming pen testing duties

Black Hat USA attendees got a firsthand look at the brand new and improved ReNgine, which incorporates a number of new options for penetration testers and pink teamers.

ReNgine is a extremely customizable open supply reconnaissance framework that works with different utilities to scan domains, checklist endpoints, and search directories.

Security professionals can use the instrument to create a pipeline that pulls collectively extra advanced queries from scan engines and current the ends in a single window.

BACKGROUND ReNgine: Open source recon tool automates intel-gathering process for pen testers

With 4,500 stars on GitHub, ReNgine has continued to develop in recognition over current months – thanks in no small half to the regular addition of recent options to help pen testers with their each day duties.

The instrument’s developer is Yogesh Ojha, a safety professional engaged on net and cell purposes. His purpose is to automate among the extra time-consuming analysis operations, in addition to bringing open source hacking instruments collectively.

“There are a number of open supply recon instruments out there,” Ojha advised The Daily Swig. “What units ReNgine other than the opposite instruments is the easy-to-use net interface, capability to customise the scan engines based on the targets, the UI/UX, and simple integration on VPS with minimal setup.”

New options

Launched in time for Black Hat USA, and showcased during the Arsenal sessions on Wednesday (August 10), ReNgine model 1.3.0 contains a number of new options.

First up is a novel subscan function that permits customers to scan any goal subdomains additional.

“Once subdomain scanning is finished, you’ll be able to select one or a number of subdomains and ship for additional port scans, vulnerability scans, or any scans obtainable,” Ojha defined.

“The added good thing about the subscan function is that, for bigger targets like google.com you needn’t look ahead to the complete scan to finish. One can merely carry out a subdomain scan and carry out additional sub scans on these subdomains.”

Read about more of the latest hacking tools

ReNgine 1.3.0 additionally comes bundled with a extremely customizable PDF report function, which permits customers to decide on the kind, look, and really feel of the report.

Meanwhile, a brand new toolbox function for ReNgine permits pen testers to combine instruments like WHOIS lookup and WAF Detector with out the necessity to add a URL/area as targets. More toolboxes are on the way in which.

Among the varied UI/UX enhancements in ReNgine 1.1, column filtering “was some of the requested for options”, Ojha stated.

“Column filtering permits customers to concentrate on what’s vital within the subdomains, endpoints, and vulnerability consequence desk part. This permits customers to cover and unhide sure columns.”

Ojha added: “In a nutshell, the newer improve of ReNgine makes it greater than only a recon instrument. The newest replace goals to repair the hole within the conventional recon instruments and possibly a significantly better various for among the industrial recon and vulnerability evaluation instruments.

YOU MIGHT ALSO LIKE Latest web hacking tools – Q3 2022

https://portswigger.internet/daily-swig/rengine-upgrade-new-subscan-feature-pdf-reports-expanded-toolbox-showcased-at-black-hat-usa

Related Posts