Aller au contenu principal

How to Install and Use Recon-ng

    • Recon-ng is readily available in Kali Linux repositories, making the installation process an easy breeze.

    • Open a terminal and execute the following command to install Recon-ng:

    • sudo apt-get update && sudo apt-get install recon-ng

    • After installation, type recon-ng in the terminal to launch the Recon-ng framework.

    • The Recon-ng console will appear, indicating that you are now ready to conduct reconnaissance tasks.

    • Recon-ng's true strength lies in its vast library of modules for various reconnaissance tasks.

    • Before using any module, run the following command to update your module repository

    • recon-ng marketplace update all

    • Recon-ng organizes your reconnaissance data into workspaces, making it easier to manage multiple projects. Create a new workspace using the following command

    • recon-ng workspace add <workspace_name>

    • Add your target(s) to the current workspace using the add command, followed by the relevant parameters. For example, to add a domain use the following command.

    • recon-ng -w <workspace_name> add domains example.com

    • Select a module from the Recon-ng marketplace that suits your reconnaissance needs. To run a module, use the use command, followed by the module name, and execute it with the run command

    • recon-ng -w <workspace_name> use recon/domains-hosts/bing_domain_web

    • recon-ng -w <workspace_name> run

    • Once the module finishes executing, review the gathered information in the workspace.

    • Recon-ng will store results in various tables, accessible using commands such as show hosts, show domains, or show contacts.

    • Export the gathered reconnaissance data for further analysis or reporting purposes. Use the csv, json, or other available formats to save the results to a file.

    • recon-ng -w <workspace_name> show hosts > hosts.csv

Conclusion

Bluf: Protecting your information from Harvester

  1. Strong Passwords: Use strong, unique passwords for your online accounts, including email, social media, and banking. Avoid using easily guessable passwords or common phrases.
  2. Enable Two-Factor Authentication: Enable 2FA when possible adds an extra layer of security to your accounts.
  3. Limit Publicly Available Information: Be cautious about the information you share publicly on social media and other platforms. Avoid your address, phone number, or birthdate.
  4. Review Privacy Settings: Regularly review and adjust the privacy settings on your social media accounts and other online profiles.
  5. Be Wary of Phishing: Stay vigilant against phishing attempts. Avoid clicking on suspicious links in emails or messages, and be cautious when sharing personal information.
  6. Use a VPN: Consider using a Virtual Private Network to encrypt your internet connection.
  7. Secure Wi-Fi Networks: Use strong, unique passwords for your home Wi-Fi network and enable WPA3 or WPA2 encryption. Avoid using unsecured public Wi-Fi networks for sensitive tasks.
  8. Regular Software Updates: Keep your operating system, web browsers, and applications up to date with the latest security patches.
  9. Use HTTPS: Look for "https://" in the URL when web browsing. This indicates a secure, encrypted connection.
  10. Use Private Browsing: Use private/incognito browsing to keep your browsing history/cookies from being stored on the device.
  11. Firewall Protection: Enable and configure firewalls on your devices to filter incoming/outgoing network traffic.
  12. Review Third-Party Permissions: Regularly review and revoke unnecessary app permissions.

Resources and References

Jacob Mehnert

Membre depuis le 10/18/21

27 051 Réputation

43 tutoriels rédigés

Équipe

iFanatics Membre de l'équipe iFanatics

Community

54 membres

154 tutoriels rédigés

0 commentaires

Ajouter un commentaire

Nombre de vues :

Dernières 24 heures : 3

7 derniers jours : 23

30 derniers jours : 182

Total : 1,530