Recon-ng Tutorial for Beginners

Recon-ng is an open-source reconnaissance framework written in Python. It is designed to facilitate information gathering and reconnaissance activities during penetration testing or security assessments. Recon-ng provides a modular approach to reconnaissance, allowing users to load different modules to perform various tasks such as DNS enumeration, WHOIS lookups, email harvesting, social media profiling, and much more.

The framework offers a command-line interface (CLI) with a variety of built-in commands and modules. Users can also write their own modules to extend its functionality. Recon-ng’s modular architecture makes it highly flexible and customizable, allowing security professionals to tailor their reconnaissance activities according to the specific needs of their engagements.

Some key features of Recon-ng include:

  1. Modular design: Recon-ng organizes its functionality into modules, allowing users to easily load and unload different modules as needed.
  2. Extensibility: Users can write their own modules to add custom functionality or integrate with other tools and APIs.
  3. Intelligence gathering: Recon-ng provides a wide range of modules for gathering information from various sources such as public databases, social media platforms, search engines, and more.
  4. Reporting: Recon-ng includes features for generating reports based on the gathered information, making it easier to document findings and share them with stakeholders.
  5. Integration: Recon-ng can be integrated with other tools and frameworks, enhancing its capabilities and interoperability within the security ecosystem.

How to install the Recon-ng

  1. In Linux Distros we can install the recon-ng with just

{sudo apt install recon-ng}

Recon-ng modules

Modules are grouped together under various categories and can be found searching on

Marketplace

– Discovery
– exploitation
– import
– recon
– reporting

Use marketplace search for a full table providing information on version, status (installed or not-installed), date updated, and dependencies or require keys.

We can search for particular module.

We will search for ssl scanner

We will install the hack target

We will use the hacktarget

We will set the target

We will run the hacktarget

READ MORE ARTICLE HERE

How to Use WPScan A Step-by-Step Tutorial

Enumeration in Ethical Hacking

Network Scanning

Footprinting and Phases of Hacking

About Author

Leave a Reply

Your email address will not be published. Required fields are marked *

en_USEnglish
Open chat
Hello
Can we help you?