Technical Information Gathering with Recon-ng

Recon-ng automates technical information gathering to drastically reduce the time spent conducting reconnaissance during Red Team engagements. Streamline your methodology with the next generation of open source information gathering capability.
Course info
Level
Intermediate
Updated
Jun 22, 2020
Duration
40m
Table of contents
Description
Course info
Level
Intermediate
Updated
Jun 22, 2020
Duration
40m
Description

Reconnaissance, also referred to as Open Source Intelligence (OSINT) gathering, is often viewed as the least important step of any information security testing methodology, and disregarded for this very reason. But rather than skip reconnaissance due to a perceived lack of value, we can increase its worth by reducing the time it takes to conduct these activities. In this course, Technical Information Gathering with Recon-ng, you will gain the ability to efficiently and effectively gather and analyze technical information from open sources. First, you will learn installation and configuration tips and be introduced to the interactive command line interface of Recon-ng. Next, you will discover installing, running, and configuring Recon-ng modules to harvest and transform data. Finally, you will explore how to analyze and export data for collaboration or use with other tools. When you are finished with this course, you will have the skills and knowledge of Recon-ng needed to accelerate the technical information gathering process and fuse results with the remainder of Red Team activities.

About the author
About the author

Tim is a believer, husband, father, veteran, software developer, security engineer, and entrepreneur with extensive experience in web application security and software development.

Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Welcome to Pluralsight and this red team tools course featuring Recog‑ng, the open source technical information‑gathering tool developed and maintained by yours truly, Tim Tomes, otherwise known as lanmaster53. As a red team operator, you've often faced the dilemma of how much time, if any, to commit to technical information‑gathering. I get it. I've been there. You may spend hours scouring the internet and end up with nothing but a few assumptions about your target environment. On the other hand, you may end up with uncovering a critical data leak that could lead to direct compromise. While the latter is less likely, what if you could reduce the time spent conducting information‑gathering activities while increasing your chances of finding that critical leak? This is exactly what Recon‑ng was designed to do. Recon‑ng is actually the original name for a script that evolved into what is now the Recon‑ng framework. When Recon‑ng was initially released, it sought to harvest information in ways that were not being done by mainstream tooling and has since become a framework of functionality the community uses to build and share modules that provide the next generation of technical information‑gathering capabilities. Whether you're looking to begin making assumptions about a target environment or collect information to conduct a specific attack, join me to learn tips and tricks for installation and general operation of Recon‑ng today.