- Lab
-
Libraries: If you want this lab, consider one of these libraries.
- Security
Reconnaissance with Recon-ng
In this lab, you will conduct offline reconnaissance against the Globomantics organization in order to understand how analysts gather, correlate, and report publicly available intelligence in restricted environments. You will work within a Recon-ng workspace and analyze pre-collected identity, infrastructure, and disclosure data to simulate real-world reconnaissance workflows without live internet access. Throughout the investigation, you will explore how email addresses, social media profiles, and organizational context can be used to infer infrastructure and assess public information exposure. You will then analyze disclosure artifacts tied to victim-owned websites to determine how sensitive information can unintentionally expand investigative scope. In the final phase, you will generate and review a structured reconnaissance intelligence report. This lab simulates real-world reconnaissance and intelligence analysis workflows commonly performed during threat intelligence collection, red team preparation, and defensive assessments. It aligns with adversary behaviors such as: > **T1589.002 – Gather Victim Identity Information: Email Addresses and Social Media** > >Using publicly available identity data to identify individuals, roles, and organizational structure associated with a target. > > **T1594 – Search Victim-Owned Websites** > >Analyzing public-facing websites, documentation, and disclosures to uncover sensitive information and additional infrastructure.
Lab Info
Table of Contents
-
Challenge
Prepare a Recon-ng Investigation and Data Sources
Create a Recon-ng workspace and configure API keys to understand how external data sources are integrated.
-
Challenge
Conduct Identity-Based Reconnaissance and Infrastructure Discovery
Use identity data to simulate email harvesting and social media enumeration workflows, and understand how identity intelligence can reveal organizational structure and associated infrastructure.
-
Challenge
Analyze Public Exposure and Produce Reconnaissance Reporting
Import and analyze disclosure artifacts to identify sensitive information exposed through victim-owned web resources and expand investigative scope.
About the author
Real skill practice before real-world application
Hands-on Labs are real environments created by industry experts to help you learn. These environments help you gain knowledge and experience, practice without compromising your system, test without risk, destroy without fear, and let you learn from your mistakes. Hands-on Labs: practice your skills before delivering in the real world.
Learn by doing
Engage hands-on with the tools and technologies you’re learning. You pick the skill, we provide the credentials and environment.
Follow your guide
All labs have detailed instructions and objectives, guiding you through the learning process and ensuring you understand every step.
Turn time into mastery
On average, you retain 75% more of your learning if you take time to practice. Hands-on labs set you up for success to make those skills stick.