CEH_recon_ng - yenbohuang/techNotes GitHub Wiki
recon-ng: https://www.kali.org/tools/recon-ng/
Footprinting a Target using Recon-ng.
- Ignore all errors when running the following commands.
recon-ng
Initialize recon-ng
marketplace install all
General Commands
Command | Note |
---|---|
modules search |
Displays all the modules available in recon-ng. |
workspaces |
Displays the commands related to the workspaces. |
workspaces create CEH |
Create workspace. |
workspaces list |
Displays a list of workspaces. |
workspaces load CEH |
Use existing workspace. |
db insert domains |
Add target domain to DB. |
show domains |
Show added domains in DB. |
show hosts |
Displays all the hosts that are harvested. |
back |
Exit workspace and go back to the attributes terminal. |
info command |
View the options required to run this module. |
Run Modules
Harvest the hosts by brute force.
modules load brute
modules load recon/domains-hosts/brute_hosts
run
Resolve hosts using the Bing module:
modules load recon/domains-hosts/bing_domain_web
run
Perform a reverse lookup for each IP address
modules load reverse_resolve
modules load recon/hosts-hosts/reverse_resolve
run
Prepare a report containing all the hosts:
modules load reporting
modules load reporting/html
options set FILENAME /home/attacker/Desktop/results.html
options set CREATOR [your name]
options set CUSTOMER Certifiedhacker Networks
run
Uses the ARIN Whois RWS to harvest POC data from Whois queries for the given domain.
modules load recon/domains-contacts/whois_pocs
options set SOURCE facebook.com
run
To extract a list of subdomains and IP addresses associated with the target URL:
modules load recon/domains-hosts/hackertarget
options set SOURCE certifiedhacker.com
run