Recon-ng — Information Gathering with Open Source Intelligence

Today we are going to learn about recon-ng. Recon-ng is very good tool for web application analysis.

Recon-ng is a fully featured Web-Reconnaissance framework which written in Python3. It gives a powerful environment to it’s users.

Recon-ng have some modules and functions which gives many useful information about the target, like sub-domains, IP, Geo-locations, vulnerabilities etc.

Recon-ng’s look and feel is close to metasploit framework This tool comes pre-installed with Kali Linux.

Let we check how we can use this tool as a basic user. Let we fire up our Kali Linux’s terminal window and apply following command:

recon-ng

Our call will open this framework as shown in following screenshot:

recon-ng kali linux

Here we got recon-ng version 5.0.1. We can see in the above screenshot that in this version ‘no modules enabled/installed’.

Let we run help command to see the help options.

help
recon-ng help

We can install modules from the market places. To see all the list of modules we can run following command:

marketplace search

 Then we can see all the modules in recon-ng as we can now see in the following screenshot:

recon-ng modules

 Now if we want to install “hackertarget”module then we can search for it’s path using following command:

marketplace search hackertarget

After applying this command we can see the path of hackertarget as shown following screenshot:

econ-ng searching module

Now in the V5 of recon-ng no modules comes pre-installed so we need to install “hackertarget” module. We can easily do it by applying following command:

marketplace install recon/domains-hosts/hackertarget

So here we used marketplace install and the path of module, that’s it.
This will install “hackertarget” module.

hackertarget module install

This is how we can install modules in recon-ng V5. But some advanced modules requires api keys to run.

Now we load a module for scan. For an example we choose “hackertarget” and load it by using following command:

modules load recon/domains-hosts/hackertarget
hackertarget module install

Now we can set sources with target, by using following command:

options set SOURCE kali.org

set target source

Now we can run by using run command.

run

Then this module will run on kali.org domain, as we can see in the following screenshot:

running Recon-ng

We can see after process complete that we got total 49 hosts These hosts are added in the hosts table. We can check by using following command:

show hosts

The screenshot is following:

hosts table in recon-ng

We can see hosts in hosts table this is how we can use Recon-ng V5 in Kali Linux.
Follow our blog to get latest tutorial as soon as possible. Follow us on Twitter and Medium.

Comments

2 responses to “Recon-ng — Information Gathering with Open Source Intelligence”

  1. Anonymous Avatar
    Anonymous

    please make more tutorials about recon-ng

  2. Kali Linux Avatar

    yes we will. Stay tuned

Leave a Reply

Your email address will not be published. Required fields are marked *