[Recon-ng V5]Footprinting and Reconnaissance

What are footprinting and reconnaissance?

Footprinting and reconnaissance are used to collect basic information about the target systems in order to exploit them. The target information is IP location information, routing information, business information, address, phone number and DNS records.

What is Recon-ng

Recon-ng is a full-featured reconnaissance framework designed with the goal of providing a powerful environment to conduct open source web-based reconnaissance quickly and thoroughly.

https://github.com/lanmaster53/recon-ng

Prerequisite

Installation

Clone the Recon-ng repository.

Change into the Recon-ng directory and Install dependencies.

Launch Recon-ng.

SHELL

In recon-ng, you need to type ! in front of shell command you type. For example,

Installing Modules

You can type this command.

marketplace install all

Workspaces

We can create our workspaces name with the command below.

Adding API keys

It is a simple matter to add API keys to recon-ng.

First, it is important to see what keys are available.

I use my Shoudan account.

keys add shodan_api <insert shodan api key >

Load modules

We can pick one of them from installed modules before.

Set the target source

--

--

--

Security Analyst(Full-time), Cloud security engineer(internship). https://www.linkedin.com/in/takahiro-oda-881423197/

Love podcasts or audiobooks? Learn on the go with our new app.

Beginner’s Guide to Proxy Servers

Trying to set up my mind on Redux as an event sourcing system

How to Solve Ugly Number Problem?

Continuous Integration with CircleCI and NodeJS

Promises in JavaScript

Angular Framework: SPA xor SSR

FIX: VS Code tailwind-rn auto-completion

It’ never too late to start.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Takahiro Oda

Takahiro Oda

Security Analyst(Full-time), Cloud security engineer(internship). https://www.linkedin.com/in/takahiro-oda-881423197/

More from Medium

A bad Combination: Unprivileged Remote Code Execution and privileged File Write

HTB — Grandpa Write up

I Too Want a Key Collection — OSINT Challenge 15

How To Secure Your Personal Data And Files — 2022