Remote Recon Automation Tool is a Bash script that automates anonymous network reconnaissance on a target by leveraging a remote VPS as a middleman. It is designed for privacy-focused users who want to perform Nmap and Whois scans through a remote server, with local anonymization measures such as MAC address spoofing, hostname suppression, DNS query blocking, and Tor-based routing (via Nipe).
Author: Radostin Tonev
Version: 1.0
Date: 13/07/2025
- Automatic installation of required tools on both local and remote machines.
- MAC address spoofing and hostname suppression for local network anonymity.
- Disables local DNS queries to prevent DNS leaks.
- Tor-based proxy chaining using Nipe to anonymize all outgoing traffic.
- Firewall rules to block all non-Tor traffic (handled by Nipe).
- SSH connection to a remote server for executing Nmap and Whois scans.
- Exports scan results and audit logs to local files.
- Cleans up traces on the remote machine after scans.
- Restores all local configurations on exit.
- Operating System: Linux (Debian/Ubuntu recommended)
- Privileges: Must be run as root (or with
sudo) - Local Dependencies:
sshpasscpanminus(cpanm)gitmacchangerisc-dhcp-client(dhclient)perl- Nipe (installed automatically)
- Remote Dependencies:
nmapwhois
- Remote Server:
- SSH access (username, password, and IP required)
-
Clone or download this script to your Linux machine.
-
Make the script executable:
chmod +x remote_control_final.sh
-
Run the script as root:
sudo ./remote_control_final.sh
-
Follow the prompts:
- Enter remote server SSH details.
- Enter the target address to scan.
- Optionally customize Nmap and Whois options.
-
Results:
- Scan results and logs are saved in the current working directory.
- Initializes and checks for root privileges.
- Installs dependencies on the local machine.
- Spoofs MAC address and disables hostname leaks (if enabled).
- Disables DNS queries locally (if enabled).
- Activates Nipe to route all traffic through Tor.
- Performs anonymity checks (including DNS leak test).
- Prompts for remote server details and connects via SSH.
- Installs dependencies on the remote server.
- Executes Whois and Nmap scans on the target from the remote server.
- Cleans up traces on the remote server.
- Restores all local configurations and exits.
recon_log_<timestamp>.txt— Audit log of all actions.whois_results_<timestamp>.txt— Whois scan results.nmap_results_<timestamp>.txt— Nmap scan results.
-
Educational Use Only:
This script is intended for educational and authorized security testing purposes.
Do not scan targets without explicit permission. -
Network Disruption:
Changing MAC address and disabling DNS may temporarily disrupt your network connection. -
Tor/Nipe:
All traffic is routed through Tor while the script is running.
Nipe and Tor are stopped and all settings are restored on exit.
- If Nipe fails to start, ensure all Perl dependencies are installed.
- If your network connection drops after MAC spoofing, ensure DHCP lease is renewed. Note: if you are running the script from VirtualBox VM MAC address spoofing must be disabled.
- Always run the script as root.
MIT License
- Nipe by HTRGouvea