Recon-ng [Part One]

Recon-ng was built by Tim Tomes and is made with Python.

Open Terminal

Type the following in the terminal.

recon-ng

Main Screen

First Step

You should first start by typing the "help" command to see all the possible commands you can use.

help

List of commands

Show Modules

show modules

Application Programming Interface (API)

Recon-ng has an amazing feature that allows a hacker to extract recon information from known API's:

  • Google
  • Bing
  • Facebook
  • Linkedin
  • Instagram
  • and others

To show what API keys that Recon-ng uses by typing the following:

keys list

Add Keys

You obtain an API key from the site and add it to Recon-ng for use.

Example:

API key from Facebook and that key was "0123456"

keys add facebook_api 0123456

If you type "keys list" again you will see the key added to the list.

Using recon-ng

We are going to use one of recon-ng commands that don't require a api key.

Scanning for vulnerabilities

XSS (cross-site scripting) vulnerabilities

You will be typing in the following:

recon-ng > use recon/domains-vulnerabilities/xssposed

This will load the module into memory

Now type "show info"

show info

This command will show similar information that Metasploit shows.

Set Source

Type the following "set source" [using google.com as example]

set source

Now it's read to run

run

After the scan completes you will be given results and if nothing is showed up then it will appear as the following:

No vulnerabilities found.

results matching ""

    No results matching ""