Professional Documents
Culture Documents
Linux
In Kali Linux, Recon-ng is a free and open-source tool available on GitHub. Recon-ng is built
on Open-Source Intelligence (OSINT), the most simple and effective reconnaissance tool.
Recon-ng UI is fairly similar to that of Metasploit 1 and Metasploit 2. On kali Linux, we can use
Recon-ng to execute a command-line interface. We can use this tool to obtain our target
(domain) information. The interactive console has a variety of useful features,
including command completion and contextual help. This tool is written in Python. It
contains numerous modules such as database interaction, interactive help, command
completion, Recon-ng that offer a powerful environment where open-source web-based
reconnaissance can be performed, and we can collect any information.
Features of Recon-ng
The following are the features of the Recon-ng:
Uses of Recon-ng
The following are the used of Recon-ng:
o Recon-ng is used to detect the target's IP addresses.
o With the help of this tool, we can find sensitive files like txt.
o We used Recon-ng to detect Content Management Systems (CMS) using a target
web application.
o Recon-ng contains several modules which we can use to gather information about the
target.
o Recon-ng port scanner modules find closed and open ports that are used to maintain
access to the server.
o Recon-ng subdomain finder modules are used to find subdomains of a singer domain.
o We can use Recon-ng to find information related to the Geo-IP lookup, port scanning,
Banner grabbing. Sub-domain information. DNS lookup, reverse IP using WHOIS
information.
o We can use Recon-ng to look for error-based SQL injections.
Congratulations, recon-ng has been successfully installed on our Kali Linux. Now, all we have to
do is run recon-ng.
Step 3: Now, we have to type the following command to run Recon-ng.
1. Recon-ng
Step 4: Type the following command into our Kali Linux terminal and press enter to start recon-
ng.
1. Recon-ng
Step 5: In order to be Reconnaissance, we must first create a workspace for it. Workspaces
are separate spaces where we may conduct reconnaissance on various targets. Simply type
the following command to learn about workspaces.
1. Workspaces
Step 6: We have created workspaces for ourselves. Now go to the marketplace and install
modules to begin our Reconnaissance. We have named our workspace javatpoint. Now we will
Reconnaissance the workspace of javatpoint. We will go to the marketplace and install the
modules which we want.
1. Marketplace search
Step 7: As we can see, there is a list of modules, and many of them are not installed therefore
type the following command to install those modules.
Step 9: As we can see, we are now in the viewdns_reverse_whois module. To utilize this
module, we must first set the source.