Recon-ng
Recon-ng is an exceptional open-source web reconnaissance framework built on Python, and it stands out as a vital tool for security professionals and researchers. Here’s a compelling overview of its key aspects:
Purpose:
Functionality:
- Domain enumeration.
- Host discovery.
- Contact information retrieval.
- And much more.
Key Features:
Use Cases:
Relationship to other tools:
Case Study:
Objective:
To find WHOIS information on a target domain name with Recon-ng.
WHOIS information can consist of location, registration and expire dates, contact information (email, phone numbers, etc.) and more about domain name. The main purpose of this study is to collect the WHOIS info.
Required Tool:
Kali Linux. Operating the Kali OS in a Virtual environment is a good choice.
Task Walkthrough:
Task 1:
Task 2:
[Workspaces allow you to keep different reconnaissance projects separate. This is crucial for maintaining clarity and avoiding data conflicts when working on multiple targets. Each workspace has its dedicated database, ensuring that data collected for one target doesn't mix with data from another.]
Recommended by LinkedIn
workspaces create myproject_whois_recon ; [ Can use any name regarding your case study]
Task 3:
Next task is to choose a domain from which we want to get WHOIS info. Since WHOIS information is available to anyone, it is ok to choose any domain. Here we set the Domain ( say, google.com) as our target.
Follow the following Steps:
marketplace search whois
and the output will show the available modules for WHOIS.
[ Modules are individual tools within the Recon-ng framework, each designed to perform a specific OSINT task and the Marketplace serves as a central repository for Recon-ng modules]
marketplace install recon/domains-contacts/whois_pocs
modules load recon/domains-contacts/whois_pocs
options set SOURCE
Similarly, you can choose any other module for WHOIS , install and load those to get the desired info.
Disclaimer:
The information and tools provided are for educational and authorized testing purposes only. Ethical hacking should only be conducted on systems and networks with explicit, written permission from the owner. Unauthorized access or use is illegal and unethical. You are solely responsible for ensuring your actions comply with all applicable laws and regulations. Misuse of this information or these tools is strictly prohibited. We do not endorse or encourage any illegal activity. Use responsibly and ethically.
Officer IT & MIS at Mutual Group | MCT, MCP, MCSA, CNSS
2moThank you sir. Truly it benefits my works.