Course 8 - Penetration Testing OSINT Gathering with Recon-ng | Episode 1: Recon-ng Installation, Shell Exploration and Data Management Podcast Por  arte de portada

Course 8 - Penetration Testing OSINT Gathering with Recon-ng | Episode 1: Recon-ng Installation, Shell Exploration and Data Management

Course 8 - Penetration Testing OSINT Gathering with Recon-ng | Episode 1: Recon-ng Installation, Shell Exploration and Data Management

Escúchala gratis

Ver detalles del espectáculo

Obtén 3 meses por US$0.99 al mes + $20 crédito Audible

In this lesson, you’ll learn about: Recon-ng Installation, Shell Navigation, and Data Management for Penetration Testing 1. Installation and Environment Setup Recon-ng is a powerful OSINT framework designed for information gathering in penetration testing. Installation options:
  • Linux (Kali Linux): Pre-installed, straightforward to use.
  • Other Linux (Ubuntu): Clone the repository using Git from Bitbucket; requires Python 2 (Python 3 not supported).
  • Windows or Mac: Run via Docker or a VirtualBox VM.
  • Dependencies: Install Python packages via pip install -r requirements.
  • API Credentials: Initial launch may show errors; these are addressed when configuring modules later.
2. Exploring the Special Shell and Data Management After launching, Recon-ng opens a custom shell (not Bash). Key elements: a. Commands
  • View top-level commands using:
    help
b. Workspaces
  • Projects are organized into workspaces.
  • Default workspace is created automatically.
  • Manage workspaces with:
    • workspaces add → create new workspace
    • workspaces select → switch workspace
  • Each workspace contains a hidden folder with:
    • data.db → project database
    • Generated report documents
  • The active workspace is shown in the prompt.
c. Database Structure
  • Around 20 tables, including:
    • domains
    • companies
    • credentials
  • Tables store critical project data used by modules.
d. Adding and Viewing Data
  • Add data using add :
  • Example: add domains bbc.com
Example: add companies ExampleCorpView data using:show domainsshow companiesNote: Creating a workspace uses workspaces add instead of add workspaces.3. Modules and Running Scans Modules are scripts that perform specific reconnaissance tasks. Recon-ng currently has around 90 modules. Workflow:Select module:
use Review info:
show info → check required settings and usage instructions.Run module:
run → uses database data (e.g., domains) for scans.Modules can perform actions like web scans, domain enumeration, or credential searches. 4. Viewing Database via Web Interface Recon-ng provides a web interface via recon-web:
Start the server from the Recon-ng directory.Access via: http://localhost:5000 or 127.0.0.1:5000Features: Click a workspace → view database tables and content.5. SummaryRecon-ng organizes projects using workspaces and database tables, enabling structured information gathering.Modules automate reconnaissance tasks using stored data.The custom shell and optional web interface provide flexible ways to manage projects.Understanding workspaces, database tables, and module workflows is critical for effective OSINT and penetration testing.

Produced by:
https://www.podcaistudio.com/
Todavía no hay opiniones