Introduction
Recon-ng is a powerful open-source reconnaissance framework that enables cybersecurity professionals, ethical hackers, and penetration testers to gather valuable intelligence about targets, domains, and online assets. With its modular architecture and extensible nature, Recon-ng streamlines the process of information gathering and helps you gain critical insights to assess the security posture of your target. In this comprehensive iFixit guide, we will walk you through the step-by-step process of installing Recon-ng and harnessing its capabilities to perform effective reconnaissance tasks. Let's embark on this journey to enhance your reconnaissance skills and fortify your cybersecurity endeavors.
Prerequisites
Before getting started, ensure you have the following:
- A Linux-based system (Ideally Kali Linux) or a virtual machine with Kali Linux installed.
- Access to the internet to download and install Recon-ng and its dependencies.
-
-
Open a terminal and execute the following command to install Recon-ng:
-
sudo apt-get update && sudo apt-get install recon-ng
-
-
-
Recon-ng's true strength lies in its vast library of modules for various reconnaissance tasks.
-
Before using any module, run the following command to update your module repository
-
recon-ng marketplace update all
-
-
-
Recon-ng organizes your reconnaissance data into workspaces, making it easier to manage multiple projects. Create a new workspace using the following command
-
recon-ng workspace add <workspace_name>
-
-
-
Add your target(s) to the current workspace using the add command, followed by the relevant parameters. For example, to add a domain use the following command.
-
recon-ng -w <workspace_name> add domains example.com
-
-
-
Select a module from the Recon-ng marketplace that suits your reconnaissance needs. To run a module, use the use command, followed by the module name, and execute it with the run command
-
recon-ng -w <workspace_name> use recon/domains-hosts/bing_domain_web
-
recon-ng -w <workspace_name> run
-
-
-
Export the gathered reconnaissance data for further analysis or reporting purposes. Use the csv, json, or other available formats to save the results to a file.
-
recon-ng -w <workspace_name> show hosts > hosts.csv
-
Bluf: Protecting your information from Harvester
- Strong Passwords: Use strong, unique passwords for your online accounts, including email, social media, and banking. Avoid using easily guessable passwords or common phrases.
- Enable Two-Factor Authentication: Enable 2FA when possible adds an extra layer of security to your accounts.
- Limit Publicly Available Information: Be cautious about the information you share publicly on social media and other platforms. Avoid your address, phone number, or birthdate.
- Review Privacy Settings: Regularly review and adjust the privacy settings on your social media accounts and other online profiles.
- Be Wary of Phishing: Stay vigilant against phishing attempts. Avoid clicking on suspicious links in emails or messages, and be cautious when sharing personal information.
- Use a VPN: Consider using a Virtual Private Network to encrypt your internet connection.
- Secure Wi-Fi Networks: Use strong, unique passwords for your home Wi-Fi network and enable WPA3 or WPA2 encryption. Avoid using unsecured public Wi-Fi networks for sensitive tasks.
- Regular Software Updates: Keep your operating system, web browsers, and applications up to date with the latest security patches.
- Use HTTPS: Look for "https://" in the URL when web browsing. This indicates a secure, encrypted connection.
- Use Private Browsing: Use private/incognito browsing to keep your browsing history/cookies from being stored on the device.
- Firewall Protection: Enable and configure firewalls on your devices to filter incoming/outgoing network traffic.
- Review Third-Party Permissions: Regularly review and revoke unnecessary app permissions.