🖍️
nullbrain
  • Intro
  • Tools
    • Preparation
  • basics/pre-req
    • Backpack
    • Linux
  • Working Tools
    • List of Note taking tools!
  • Practice Tools
    • Netcat
    • Socat
    • Powercat
    • PowerShell
  • Network Analysis Tools
    • Wireshark
    • Tcpdump
  • PRIVILEGE ESCALATION
    • Example
    • 🏁Kernel Exploits
    • 🪛Credentials
      • Reuse Passwords
      • Bash History
      • Local Database
  • Passive Information Gathering
    • Index
    • Tools
      • Recon-ng
        • Recon-ng [Usage]
      • Google Hacking DB [GHDB]
      • Whois
    • Techniques
      • Google Hacking
      • Website Recon
        • WR with Python
  • Active Information Gathering
    • Enumeration
      • NFS
      • SMB
    • Masscan
    • Nmap
    • Port Scanning
    • DNS
      • Scripts
      • Lookup
      • DNSRecon
      • DNSenum
  • Vulnerability Scanning
    • Vulnerability Scanning
    • Nmap
  • Web Application Exploit
    • Enumeration
      • Techniques
    • Tools
      • DIRB
  • Buffer Overflow
    • Memory
  • Real World!
    • Bruteforce
    • Tools
    • Enumeration
      • Enumeration MindMap
      • Tools
    • SQL Injection
    • Server-Side Template Injection
    • Hashcat
      • Hashcat options
    • Web Reconnaissance
    • Recon
    • Port Scanning
    • Privilege escalation
      • File permissions
      • Service Exploits
      • Kernel Exploits
      • Privilege Checker
      • snapd
      • SUID
      • Splunk
    • Reverse Shell
      • PHP deserialization
    • PHP
    • Exploits & Footholds
      • Exploit Mindmap
  • Checklist (CTF targetted)
    • checklist
  • Malicious payload
    • Metasploit APK
Powered by GitBook
On this page
  1. Passive Information Gathering
  2. Tools
  3. Recon-ng

Recon-ng [Usage]

Recon-ng is module based, similar to Metasploit (if you have some experience using the Metasploit framework).

Command

Purpose

Example

marketplace search <string>

Module search

marketplace search github

marketplace info <string>

Learn more about module

marketplace info recon/repositories-vulnerabilities/github_dorks

marketplace install <string>

Installing module using marketplace

marketplace install recon/repositories-vulnerabilities/github_dorks

modules load <string>

Load installed module

modules load recon/domains-hosts/google_site_web

Subcommands

Purpose

info

Display detail of the loaded module.

options set SOURCE <string>

Set our target domain.

run

Run the module.

back

Return to the main recon-ng prompt

show

Show stored data

PreviousRecon-ngNextGoogle Hacking DB [GHDB]

Last updated 4 years ago