0% found this document useful (0 votes)
366 views15 pages

Recon NG

The document provides a tutorial on using the recon-ng tool for open source intelligence and reconnaissance. It discusses what recon-ng is, how to install it, how to create workspaces and use modules to automate gathering information from open sources on targets.

Uploaded by

zacktoby74
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
366 views15 pages

Recon NG

The document provides a tutorial on using the recon-ng tool for open source intelligence and reconnaissance. It discusses what recon-ng is, how to install it, how to create workspaces and use modules to automate gathering information from open sources on targets.

Uploaded by

zacktoby74
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

Recon-NG Tutorial | HackerTarget.com https://hackertarget.

com/recon-ng-tutorial/

SECURITY NEWS, SECURITY RESEARCH, TOOLS, TUTORIAL | NOVEMBER 16, 2022

Recon-NG Tutorial

article revised and updated Nov 2022


In this recon-ng tutorial, discover open source intelligence and easily pivot to new
results. Using a modular approach, collect and dig deeper into extracted data.

What is Recon-ng?
Recon-ng is a reconnaissance / OSINT tool with an interface similar to Metasploit. Running recon-ng
from the command line speeds up the recon process as it automates gathering information from open
sources.

Recon-ng has a variety of options to configure, perform recon, and output results to different report
types.

The interactive console provides a number of helpful features such as command completion and
contextual help.

Recon-ng Installation
Installing Recon-ng is very simple and there are a few common ways. Below are a few examples;

Kali:
At the time of this article version 5.1.2 comes pre-installed with Kali Linux. Having said that, its good
to run apt-get update && apt-get install recon-ng to ensure latest dependencies
installed.

Ubuntu:
Requires git and pip installed.

We use cookies to ensure that we give you the best experience on our site. If you continue to use this site we
assume that you accept this.
Ok
1 of 15 1/5/24, 16:03
Recon-NG Tutorial | HackerTarget.com https://hackertarget.com/recon-ng-tutorial/

test@ubuntu:~/$ git clone https://github.com/lanmaster53/recon-ng.git


test@ubuntu:~/$ cd recon-ng
test@ubuntu:~/recon-ng/$ pip install -r REQUIREMENTS

Next to run recon-ng;

test@ubuntu:~/recon-ng/$ ./recon-ng

The Recon-NG console is now loaded.

_/_/_/ _/_/_/_/ _/_/_/ _/_/_/ _/ _/ _/ _/ _/_/_/


_/ _/ _/ _/ _/ _/ _/_/ _/ _/_/ _/ _/
_/_/_/ _/_/_/ _/ _/ _/ _/ _/ _/ _/_/_/_/ _/ _/ _/ _/ _/_/_/
_/ _/ _/ _/ _/ _/ _/ _/_/ _/ _/_/ _/ _/
_/ _/ _/_/_/_/ _/_/_/ _/_/_/ _/ _/ _/ _/ _/_/_/

/\
/ \\ /\
Sponsored by... /\ /\/ \\V \/\
/ \\/ // \\\\\ \\ \/\
// // BLACK HILLS \/ \\
www.blackhillsinfosec.com

____ ____ ____ ____ _____ _ ____ ____ ____


|____] | ___/ |____| | | | |____ |____ |
| | \_ | | |____ | | ____| |____ |____
www.practisec.com

[recon-ng v5.1.2, Tim Tomes (@lanmaster53)]

[*] No modules enabled/installed.

[recon-ng][default] >

Using recon-ng
From the console it is easy to get help and get started with your recon.

We use cookies to ensure that we give you the best experience on our site. If you continue to use this site we
[recon-ng][default] > help
assume that you accept this.
Commands (type [help|?] ): Ok
---------------------------------
2 of 15 1/5/24, 16:03
Recon-NG Tutorial | HackerTarget.com https://hackertarget.com/recon-ng-tutorial/
back Exits the current context
dashboard Displays a summary of activity
db Interfaces with the workspace's database
exit Exits the framework
help Displays this menu
index Creates a module index (dev only)
keys Manages third party resource credentials
marketplace Interfaces with the module marketplace
modules Interfaces with installed modules
options Manages the current context options
pdb Starts a Python Debugger session (dev only)
script Records and executes command scripts
shell Executes shell commands
show Shows various framework items
snapshots Manages workspace snapshots
spool Spools output to a file
workspaces Manages workspaces

Recon-ng begins with an empty framework. No modules enabled or installed.

[*] No modules enabled/installed.

How to use Recon-ng:


Create a Workspace
There is a lot of options when using this OSINT tool. Maintaining collected information and notes
organised is a necessary part of any OSINT investigation. Creating a workspaces keeps things
orderly and easy to find. When using Recon-ng workspaces, all data located and collected is saved
within a database in that workspace.

[recon-ng][default] > workspaces create example_name

[recon-ng][default] > workspaces create example_name


[recon-ng][example_name] >

We use cookies to ensure that we give you the best experience on our site. If you continue to use this site we
The command recon-ng -w example_name opens or returns directly to that workspace.
assume that you accept this.
Ok
3 of 15 1/5/24, 16:03
Recon-NG Tutorial | HackerTarget.com https://hackertarget.com/recon-ng-tutorial/

test@ubuntu:~/$ recon-ng -w example_name

[recon-ng][example_name] >

Recon-ng Marketplace and Modules


Here again the help comes in handy marketplace help shows commands for removing modules,
how to find more info, search, refresh and install.

[recon-ng][default] > marketplace help


Interfaces with the module marketplace

Usage: marketplace info|install|refresh|remove|search [...]

Typing marketplace search displays a list of all the modules. From which you can start following
the white rabbit exploring and getting deeper into recon and open source intelligence.

Recon-ng modules
Modules are grouped together under various categories and can be found searching on
marketplace

- discovery
- exploitation
- import
- recon
- reporting

Each of the above have sub categories as shown in the table below. Use marketplace search for
a full table providing information on version, status (installed or not-installed), date updated,
dependencies or require keys.

[recon-ng][example_name] > marketplace search


We use cookies to ensure that we give you the best experience on our site. If you continue to use this site we
+---------------------------------------------------------------------------------------------------+
assume that you accept this.
| Path | Version | Status | Updated | D | K |
Ok
+---------------------------------------------------------------------------------------------------+
4 of 15 1/5/24, 16:03
Recon-NG Tutorial | HackerTarget.com https://hackertarget.com/recon-ng-tutorial/
| discovery/info_disclosure/cache_snoop | 1.1 | not installed | 2020-10-13 | | |
| discovery/info_disclosure/interesting_files | 1.2 | not installed | 2021-10-04 | | |
| exploitation/injection/command_injector | 1.0 | not installed | 2019-06-24 | | |
| exploitation/injection/xpath_bruter | 1.2 | not installed | 2019-10-08 | | |
| import/csv_file | 1.1 | not installed | 2019-08-09 | | |
| import/list | 1.1 | not installed | 2019-06-24 | | |
| import/masscan | 1.0 | not installed | 2020-04-07 | | |
| import/nmap | 1.1 | not installed | 2020-10-06 | | |
| recon/companies-contacts/bing_linkedin_cache | 1.0 | not installed | 2019-06-24 | | * |
| recon/companies-contacts/censys_email_address | 2.0 | not installed | 2021-05-11 | * | * |
| recon/companies-contacts/pen | 1.1 | not installed | 2019-10-15 | | |
| recon/companies-domains/censys_subdomains | 2.0 | not installed | 2021-05-10 | * | * |
| recon/companies-domains/pen | 1.1 | not installed | 2019-10-15 | | |
| recon/companies-domains/viewdns_reverse_whois | 1.1 | not installed | 2021-08-24 | | |
| recon/companies-domains/whoxy_dns | 1.1 | not installed | 2020-06-17 | | * |
| recon/companies-hosts/censys_org | 2.0 | not installed | 2021-05-11 | * | * |
| recon/companies-hosts/censys_tls_subjects | 2.0 | not installed | 2021-05-11 | * | * |
| recon/companies-multi/github_miner | 1.1 | not installed | 2020-05-15 | | * |
| recon/companies-multi/shodan_org | 1.1 | not installed | 2020-07-01 | * | * |
| recon/companies-multi/whois_miner | 1.1 | not installed | 2019-10-15 | | |
| recon/contacts-contacts/abc | 1.0 | not installed | 2019-10-11 | * | |
| recon/contacts-contacts/mailtester | 1.0 | not installed | 2019-06-24 | | |
| recon/contacts-contacts/mangle | 1.0 | not installed | 2019-06-24 | | |
| recon/contacts-contacts/unmangle | 1.1 | not installed | 2019-10-27 | | |
| recon/contacts-credentials/hibp_breach | 1.2 | not installed | 2019-09-10 | | * |
| recon/contacts-credentials/hibp_paste | 1.1 | not installed | 2019-09-10 | | * |
| recon/contacts-domains/migrate_contacts | 1.1 | not installed | 2020-05-17 | | |
| recon/contacts-profiles/fullcontact | 1.1 | not installed | 2019-07-24 | | * |
| recon/credentials-credentials/adobe | 1.0 | not installed | 2019-06-24 | | |
| recon/credentials-credentials/bozocrack | 1.0 | not installed | 2019-06-24 | | |
| recon/credentials-credentials/hashes_org | 1.0 | not installed | 2019-06-24 | | * |
| recon/domains-companies/censys_companies | 2.0 | not installed | 2021-05-10 | * | * |
| recon/domains-companies/pen | 1.1 | not installed | 2019-10-15 | | |
| recon/domains-companies/whoxy_whois | 1.1 | not installed | 2020-06-24 | | * |
| recon/domains-contacts/hunter_io | 1.3 | not installed | 2020-04-14 | | * |
| recon/domains-contacts/metacrawler | 1.1 | not installed | 2019-06-24 | * | |
| recon/domains-contacts/pen | 1.1 | not installed | 2019-10-15 | | |
| recon/domains-contacts/pgp_search | 1.4 | not installed | 2019-10-16 | | |
| recon/domains-contacts/whois_pocs | 1.0 | not installed | 2019-06-24 | | |
| recon/domains-contacts/wikileaker | 1.0 | not installed | 2020-04-08 | | |
| recon/domains-credentials/pwnedlist/account_creds | 1.0 | not installed | 2019-06-24 | * | * |
| recon/domains-credentials/pwnedlist/api_usage | 1.0 | not installed | 2019-06-24 | | * |
| recon/domains-credentials/pwnedlist/domain_creds | 1.0 | not installed | 2019-06-24 | * | * |
| recon/domains-credentials/pwnedlist/domain_ispwned | 1.0 | not installed | 2019-06-24 | | * |
| recon/domains-credentials/pwnedlist/leak_lookup | 1.0 | not installed | 2019-06-24 | | |
| recon/domains-credentials/pwnedlist/leaks_dump | 1.0 | not installed | 2019-06-24 | | * |
| recon/domains-domains/brute_suffix | 1.1 | not installed | 2020-05-17 | | |
| recon/domains-hosts/binaryedge | 1.2 | not installed | 2020-06-18 | | * |
| recon/domains-hosts/bing_domain_api | 1.0 | not installed | 2019-06-24 | | * |
| recon/domains-hosts/bing_domain_web | 1.1 | not installed | 2019-07-04 | | |
| recon/domains-hosts/brute_hosts | 1.0 | not installed | 2019-06-24 | | |
| recon/domains-hosts/builtwith | 1.1 | not installed | 2021-08-24 | | * |
| recon/domains-hosts/censys_domain | 2.0 | not installed | 2021-05-10 | * | * |

We| use
recon/domains-hosts/certificate_transparency
cookies to ensure that we give you the best experience|on1.2
our site.|If not
you installed
continue to |use
2019-09-16
this site we| | |
| recon/domains-hosts/google_site_web | 1.0 | not installed | 2019-06-24 | | |
assume that you accept this.
| recon/domains-hosts/hackertarget | 1.1 | not installed | 2020-05-17 | | |
| recon/domains-hosts/mx_spf_ip Ok | 1.0 | not installed | 2019-06-24 | | |
5 of 15 | recon/domains-hosts/netcraft | 1.1 | not installed | 2020-02-05 |
1/5/24, | |
16:03
Recon-NG Tutorial | HackerTarget.com https://hackertarget.com/recon-ng-tutorial/
| recon/domains-hosts/shodan_hostname | 1.1 | not installed | 2020-07-01 | * | * |
| recon/domains-hosts/spyse_subdomains | 1.1 | not installed | 2021-08-24 | | * |
| recon/domains-hosts/ssl_san | 1.0 | not installed | 2019-06-24 | | |
| recon/domains-hosts/threatcrowd | 1.0 | not installed | 2019-06-24 | | |
| recon/domains-hosts/threatminer | 1.0 | not installed | 2019-06-24 | | |
| recon/domains-vulnerabilities/ghdb | 1.1 | not installed | 2019-06-26 | | |
| recon/domains-vulnerabilities/xssed | 1.1 | not installed | 2020-10-18 | | |
| recon/hosts-domains/migrate_hosts | 1.1 | not installed | 2020-05-17 | | |
| recon/hosts-hosts/bing_ip | 1.0 | not installed | 2019-06-24 | | * |
| recon/hosts-hosts/censys_hostname | 2.0 | not installed | 2021-05-10 | * | * |
| recon/hosts-hosts/censys_ip | 2.0 | not installed | 2021-05-10 | * | * |
| recon/hosts-hosts/censys_query | 2.0 | not installed | 2021-05-10 | * | * |
| recon/hosts-hosts/ipinfodb | 1.2 | not installed | 2021-08-24 | | * |
| recon/hosts-hosts/ipstack | 1.0 | not installed | 2019-06-24 | | * |
| recon/hosts-hosts/resolve | 1.0 | not installed | 2019-06-24 | | |
| recon/hosts-hosts/reverse_resolve | 1.0 | not installed | 2019-06-24 | | |
| recon/hosts-hosts/ssltools | 1.0 | not installed | 2019-06-24 | | |
| recon/hosts-hosts/virustotal | 1.0 | not installed | 2019-06-24 | | * |
| recon/hosts-locations/migrate_hosts | 1.0 | not installed | 2019-06-24 | | |
| recon/hosts-ports/binaryedge | 1.0 | not installed | 2019-06-24 | | * |
| recon/hosts-ports/shodan_ip | 1.2 | not installed | 2020-07-01 | * | * |
| recon/locations-locations/geocode | 1.0 | not installed | 2019-06-24 | | * |
| recon/locations-locations/reverse_geocode | 1.0 | not installed | 2019-06-24 | | * |
| recon/locations-pushpins/flickr | 1.0 | not installed | 2019-06-24 | | * |
| recon/locations-pushpins/shodan | 1.1 | not installed | 2020-07-07 | * | * |
| recon/locations-pushpins/twitter | 1.1 | not installed | 2019-10-17 | | * |
| recon/locations-pushpins/youtube | 1.2 | not installed | 2020-09-02 | | * |
| recon/netblocks-companies/censys_netblock_company | 2.0 | not installed | 2021-05-11 | * | * |
| recon/netblocks-companies/whois_orgs | 1.0 | not installed | 2019-06-24 | | |
| recon/netblocks-hosts/censys_netblock | 2.0 | not installed | 2021-05-10 | * | * |
| recon/netblocks-hosts/reverse_resolve | 1.0 | not installed | 2019-06-24 | | |
| recon/netblocks-hosts/shodan_net | 1.2 | not installed | 2020-07-21 | * | * |
| recon/netblocks-hosts/virustotal | 1.0 | not installed | 2019-06-24 | | * |
| recon/netblocks-ports/census_2012 | 1.0 | not installed | 2019-06-24 | | |
| recon/netblocks-ports/censysio | 1.0 | not installed | 2019-06-24 | | * |
| recon/ports-hosts/migrate_ports | 1.0 | not installed | 2019-06-24 | | |
| recon/ports-hosts/ssl_scan | 1.1 | not installed | 2021-08-24 | | |
| recon/profiles-contacts/bing_linkedin_contacts | 1.2 | not installed | 2021-08-24 | | * |
| recon/profiles-contacts/dev_diver | 1.1 | not installed | 2020-05-15 | | |
| recon/profiles-contacts/github_users | 1.0 | not installed | 2019-06-24 | | * |
| recon/profiles-profiles/namechk | 1.0 | not installed | 2019-06-24 | | * |
| recon/profiles-profiles/profiler | 1.0 | not installed | 2019-06-24 | | |
| recon/profiles-profiles/twitter_mentioned | 1.0 | not installed | 2019-06-24 | | * |
| recon/profiles-profiles/twitter_mentions | 1.0 | not installed | 2019-06-24 | | * |
| recon/profiles-repositories/github_repos | 1.1 | not installed | 2020-05-15 | | * |
| recon/repositories-profiles/github_commits | 1.0 | not installed | 2019-06-24 | | * |
| recon/repositories-vulnerabilities/gists_search | 1.0 | not installed | 2019-06-24 | | |
| recon/repositories-vulnerabilities/github_dorks | 1.0 | not installed | 2019-06-24 | | * |
| reporting/csv | 1.0 | not installed | 2019-06-24 | | |
| reporting/html | 1.0 | not installed | 2019-06-24 | | |
| reporting/json | 1.0 | not installed | 2019-06-24 | | |
| reporting/list | 1.0 | not installed | 2019-06-24 | | |
| reporting/proxifier | 1.0 | not installed | 2019-06-24 | | |

We| use
reporting/pushpin
cookies to ensure that we give you the best experience|on1.0
our site.|If not
you installed
continue to |use
2019-06-24
this site we| | * |
| reporting/xlsx | 1.0 | not installed | 2019-06-24 | | |
assume that you accept this.
| reporting/xml | 1.1 | not installed | 2019-06-24 | | |
Ok
+---------------------------------------------------------------------------------------------------+
6 of 15 1/5/24, 16:03
Recon-NG Tutorial | HackerTarget.com https://hackertarget.com/recon-ng-tutorial/
D = Has dependencies. See info for details.
K = Requires keys. See info for details.

Marketplace search brings up the full table, however you can be more specific in your search, a
couple of examples

recon-ng][default] >marketplace search ssl


[*] Searching module index for 'ssl'...

+----------------------------------------------------------------------------+
| Path | Version | Status | Updated | D | K |
+----------------------------------------------------------------------------+
| recon/domains-hosts/ssl_san | 1.0 | not installed | 2019-06-24 | | |
| recon/hosts-hosts/ssltools | 1.0 | not installed | 2019-06-24 | | |
| recon/ports-hosts/ssl_scan | 1.1 | not installed | 2021-08-24 | | |
+----------------------------------------------------------------------------+

D = Has dependencies. See info for details.


K = Requires keys. See info for details.

[recon-ng][default] >

To find out more info on a specific module

[recon-ng][default] > marketplace info ssltools

+---------------------------------------------------------------------------------------+
| path | recon/hosts-hosts/ssltools
| name | SSLTools.com Host Name Lookups
| author | Tim Maletic (borrowing from the ssl_san module by Zach Graces)
| version | 1.0
| last_updated | 2019-06-24
| description | Uses the ssltools.com site to obtain host names from a site's SSL certificate metadata t
| required_keys | []
| dependencies | []
| files | []
| status | not installed
+------------------------------------------------------------------------------------+

[recon-ng][default] >

As noted
We useabove Hackertarget
cookies to ensure thathas a module.
we give Thisexperience
you the best will be used as site.
on our an example on how
If you continue to use
to use recon-
this site we
ng. assume that you accept this.
Ok
7 of 15 1/5/24, 16:03
Recon-NG Tutorial | HackerTarget.com https://hackertarget.com/recon-ng-tutorial/

Recon-ng example
As an example on how to use Recon-ng, hackertarget has a module to gather subdomains
recon/domains-hosts/hackertarget. This module uses the Hackertarget API and hostname
search.

Install module

To install this module use the following:

[recon-ng][default] > marketplace install hackertarget


[*] Module installed: recon/domains-hosts/hackertarget
[*] Reloading modules...
[recon-ng][default] >

Load module

[recon-ng][default] > modules load hackertarget


[recon-ng][default][hackertarget] >

Module Help

The help command from within a loaded module has different options to the global 'help'.
When you are ready to explore more modules use 'back'.

[recon-ng][default][hackertarget] > help

Commands (type [help|?] ):


---------------------------------
back Exits the current context
dashboard Displays a summary of activity
db Interfaces with the workspace's database
exit Exits the framework
goptions Manages the global context options
help Displays this menu
info Shows details about the loaded module
input Shows inputs based on the source option
keys Manages third party resource credentials
modules Interfaces with installed modules
options Manages the current context options
We
pdb use cookies to Starts
ensure athat we give
Python you the session
Debugger best experience on our site. If you continue to use this site we
(dev only)
reload Reloads the loaded assume
module that you accept this.
run Runs the loaded module
script
Ok
Records and executes command scripts
8 of 15 1/5/24, 16:03
Recon-NG Tutorial | HackerTarget.com https://hackertarget.com/recon-ng-tutorial/
shell Executes shell commands
show Shows various framework items
spool Spools output to a file

[recon-ng][default][hackertarget] >

Set source

Using show options, brings a table showing the source current value set at default.

[recon-ng][default][hackertarget] > show options

Name Current Value Required Description


------ ------------- -------- -----------
SOURCE default yes source of input (see 'show info' for details)

Now, set the source to the name of the domain investigating. This example uses tesla.com as they
have a published big bounty.

Use command options set SOURCE tesla.com

[recon-ng][default][hackertarget] > options set SOURCE tesla.com


SOURCE => tesla.com

Use command info. This shows current value has changed to tesla.com

[recon-ng][default][hackertarget] > info

Options:
Name Current Value Required Description
------ ------------- -------- -----------
SOURCE tesla.com yes source of input (see 'info' for details)

Source Options:
default SELECT DISTINCT domain FROM domains WHERE domain IS NOT NULL
string string representing a single input
path path to a file containing a list of inputs
query sql database query returning one column of inputs

We use cookies to ensure that we give you the best experience on our site. If you continue to use this site we
assume that you accept this.
Use input to see
Ok
9 of 15 1/5/24, 16:03
Recon-NG Tutorial | HackerTarget.com https://hackertarget.com/recon-ng-tutorial/

[recon-ng][default][hackertarget] > input

+---------------+
| Module Inputs |
+---------------+
| tesla.com |
+---------------+

Run the module

Type run to execute the module.

[recon-ng][default][hackertarget] > run

---------
TESLA.COM
---------
[*] Host: tesla.com
[*] Ip_Address: 104.119.104.74
[*] --------------------------------------------------
[*] Host: o7.ptr6980.tesla.com
[*] Ip_Address: 149.72.144.42
[*] --------------------------------------------------
[*] Host: vpn1.tesla.com
[*] Ip_Address: 8.45.124.215
[*] --------------------------------------------------
[*] Host: apacvpn1.tesla.com
[*] Ip_Address: 8.244.131.215
[*] --------------------------------------------------
[*] Host: cnvpn1.tesla.com
[*] Ip_Address: 114.141.176.215
[*] --------------------------------------------------
[*] Host: vpn2.tesla.com
[*] Ip_Address: 8.47.24.215
[*] --------------------------------------------------
[*] Host: model3.tesla.com
[*] Ip_Address: 205.234.27.221
[*] --------------------------------------------------
[*] Host: o3.ptr1444.tesla.com
[*] Ip_Address: 149.72.152.236
[*] --------------------------------------------------
[*] Host: o2.ptr556.tesla.com
[*] Ip_Address: 149.72.134.64
[*] --------------------------------------------------
[*] Host: o5.ptr8466.tesla.com
[*] Ip_Address: 149.72.172.170
[*] --------------------------------------------------
[*] use
We Host: o6.ptr9437.tesla.com
cookies to ensure that we give you the best experience on our site. If you continue to use this site we
[*] Ip_Address: 168.245.123.10
assume that you accept this.
[*] --------------------------------------------------
[*] Host: o4.ptr1867.tesla.com Ok
10 of 15 1/5/24, 16:03
Recon-NG Tutorial | HackerTarget.com https://hackertarget.com/recon-ng-tutorial/
[*] Ip_Address: 149.72.163.58
[*] --------------------------------------------------
[*] Host: marketing.tesla.com
[*] Ip_Address: 13.111.47.196
[*] --------------------------------------------------
[*] Host: o1.ptr2410.link.tesla.com
[*] Ip_Address: 149.72.247.52
[*] --------------------------------------------------
[*] Host: referral.tesla.com
[*] Ip_Address: 72.10.32.90
[*] --------------------------------------------------
[*] Host: mta2.email.tesla.com
[*] Ip_Address: 13.111.4.231
[*] --------------------------------------------------
[*] Host: mta.email.tesla.com
[*] Ip_Address: 13.111.14.190
[*] --------------------------------------------------
[*] Host: xmail.tesla.com
[*] Ip_Address: 204.74.99.100
[*] --------------------------------------------------
[*] Host: comparison.tesla.com
[*] Ip_Address: 64.125.183.133
[*] --------------------------------------------------
[*] Host: apacvpn.tesla.com
[*] Ip_Address: 8.244.67.215
[*] --------------------------------------------------
[*] Host: cnvpn.tesla.com
[*] Ip_Address: 103.222.41.215
[*] --------------------------------------------------
[*] Host: emails.tesla.com
[*] Ip_Address: 13.111.18.27
[*] --------------------------------------------------
[*] Host: mta2.emails.tesla.com
[*] Ip_Address: 13.111.88.1
[*] --------------------------------------------------
[*] Host: mta3.emails.tesla.com
[*] Ip_Address: 13.111.88.2
[*] --------------------------------------------------
[*] Host: mta4.emails.tesla.com
[*] Ip_Address: 13.111.88.52
[*] --------------------------------------------------
[*] Host: mta5.emails.tesla.com
[*] Ip_Address: 13.111.88.53
[*] --------------------------------------------------
[*] Host: mta.emails.tesla.com
[*] Ip_Address: 13.111.62.118
[*] --------------------------------------------------
[*] Host: click.emails.tesla.com
[*] Ip_Address: 13.111.48.179
[*] --------------------------------------------------
[*] Host: view.emails.tesla.com
[*] Ip_Address: 13.111.49.179
[*] --------------------------------------------------
[*] use
We Host: itanswers.tesla.com
cookies to ensure that we give you the best experience on our site. If you continue to use this site we
[*] Ip_Address: 204.74.99.100
assume that you accept this.
[*] --------------------------------------------------
[*] Host: events.tesla.com Ok
11 of 15 [*] Ip_Address: 13.111.47.195 1/5/24, 16:03
Recon-NG Tutorial | HackerTarget.com https://hackertarget.com/recon-ng-tutorial/
[*] --------------------------------------------------
[*] Host: www-uat.tesla.com
[*] Ip_Address: 199.66.9.47
[*] --------------------------------------------------
[*] Host: shop.eu.tesla.com
[*] Ip_Address: 205.234.27.221
[*] --------------------------------------------------
[*] Host: mfamobile-dev.tesla.com
[*] Ip_Address: 205.234.27.209
[*] --------------------------------------------------
[*] Host: mfauser-dev.tesla.com
[*] Ip_Address: 205.234.27.209
[*] --------------------------------------------------

-------
SUMMARY
-------
[*] 35 total (35 new) hosts found.

Show hosts

Now we have begun to populate our hosts. Typing show hosts will give you a summary of the
resources discovered.

[recon-ng][default][hackertarget] > show hosts


+----------------------------------------------------------------------------------------------------------------------+
| rowid | host | ip_address | region | country | latitude | longitude | notes | module |
+----------------------------------------------------------------------------------------------------------------------+
| 1 | tesla.com | 104.119.104.74 | | | | | | hackertarget |
| 2 | o7.ptr6980.tesla.com | 149.72.144.42 | | | | | | hackertarget |
| 3 | vpn1.tesla.com | 8.45.124.215 | | | | | | hackertarget |
| 4 | apacvpn1.tesla.com | 8.244.131.215 | | | | | | hackertarget |
| 5 | cnvpn1.tesla.com | 114.141.176.215 | | | | | | hackertarget |
| 6 | vpn2.tesla.com | 8.47.24.215 | | | | | | hackertarget |
| 7 | model3.tesla.com | 205.234.27.221 | | | | | | hackertarget |
| 8 | o3.ptr1444.tesla.com | 149.72.152.236 | | | | | | hackertarget |
| 9 | o2.ptr556.tesla.com | 149.72.134.64 | | | | | | hackertarget |
| 10 | o5.ptr8466.tesla.com | 149.72.172.170 | | | | | | hackertarget |
| 11 | o6.ptr9437.tesla.com | 168.245.123.10 | | | | | | hackertarget |
| 12 | o4.ptr1867.tesla.com | 149.72.163.58 | | | | | | hackertarget |
| 13 | marketing.tesla.com | 13.111.47.196 | | | | | | hackertarget |
| 14 | o1.ptr2410.link.tesla.com | 149.72.247.52 | | | | | | hackertarget |
| 15 | referral.tesla.com | 72.10.32.90 | | | | | | hackertarget |
| 16 | mta2.email.tesla.com | 13.111.4.231 | | | | | | hackertarget |
| 17 | mta.email.tesla.com | 13.111.14.190 | | | | | | hackertarget |
| 18 | xmail.tesla.com | 204.74.99.100 | | | | | | hackertarget |
| 19 | comparison.tesla.com | 64.125.183.133 | | | | | | hackertarget |
| 20 | apacvpn.tesla.com | 8.244.67.215 | | | | | | hackertarget |
| 21 | cnvpn.tesla.com | 103.222.41.215 | | | | | | hackertarget |
| 22 | emails.tesla.com | 13.111.18.27 | | | | | | hackertarget |
| 23 | mta2.emails.tesla.com | 13.111.88.1 | | | | | | hackertarget |
| 24 | mta3.emails.tesla.com | 13.111.88.2 | | | | | | hackertarget |
| 25 | mta4.emails.tesla.com | 13.111.88.52 | | | | | | hackertarget |
We use cookies to ensure that we |give
| 26 | mta5.emails.tesla.com
you the best| experience
13.111.88.53 |
on our
|
site. If you
|
continue|to use |this site we
hackertarget |
| 27 | mta.emails.tesla.com assume
| 13.111.62.118 that
| you accept
| this.| | | | hackertarget |
| 28 | click.emails.tesla.com | 13.111.48.179 | | | | | | hackertarget |
| 29 | view.emails.tesla.com | 13.111.49.179 | Ok | | | | | hackertarget |
| 30 | itanswers.tesla.com | 204.74.99.100 | | | | | | hackertarget |
12 of 15 1/5/24, 16:03
Recon-NG Tutorial | HackerTarget.com https://hackertarget.com/recon-ng-tutorial/
| 31 | events.tesla.com | 13.111.47.195 | | | | | | hackertarget |
| 32 | www-uat.tesla.com | 199.66.9.47 | | | | | | hackertarget |
| 33 | shop.eu.tesla.com | 205.234.27.221 | | | | | | hackertarget |
| 34 | mfamobile-dev.tesla.com | 205.234.27.209 | | | | | | hackertarget |
| 35 | mfauser-dev.tesla.com | 205.234.27.209 | | | | | | hackertarget |
+----------------------------------------------------------------------------------------------------------------------+

[*] 35 rows returned

[recon-ng][default][hackertarget] >

--------------------------------------------------------------

Add API keys to Recon-ng


It is a simple matter to add API keys to recon-ng. Shodan with a PRO account is a highly
recommended option. This will enable queries to open ports on your discovered hosts without
sending any packets to the target systems.

How to add shodan API key


Create or login to your Shodan account, Go to 'Account" in top right corner. The API Key is listed here
on the Account Overview page.

Recon-ng shows the syntax to add an API key is below

[recon-ng][default] > keys add


Adds/Updates a third party resource credential

Usage: keys add name value

[recon-ng][default] keys add shodan_api bbexampleapikey33

.recon-ng configuration files


When you install recon-ng on your machine, it creates a folder in your home directory called .recon-
ng. Contained in this folder is keys.db. If you are upgrading from one version to another or changed
computers, and have previous modules that require keys to work, copy this file from the old version
on your system
We use and
cookies move itthat
to ensure onwe
thegive
newyouone. Youexperience
the best do not have to start
on our site. Ifallyou
over again.to use this site we
continue
assume that you accept this.
Ok
13 of 15 test@test-desktop:~/.recon-ng$ ls 1/5/24, 16:03
Recon-NG Tutorial | HackerTarget.com https://hackertarget.com/recon-ng-tutorial/

keys.db
modules
modules.yml
workspaces

test@test-desktop:~/.recon-ng$

Conclusion
Recon-ng is a powerful tool that can be further explored by viewing the list of modules. The help
within the console is clear, and with a bit of playing around it won't take long to become an expert.

The rise of bug bounties allows you to play with new tools and explore Organizations' every
expanding attack surface footprint. Have fun. Don't break the rules.

For a great overview on version 5 check out the you tube video by Tim Tomes.

Next Level Your Technical Network


Intelligence

Use Cases and More Info

PREVIOUS NEXT

Gobuster tutorial Snort Tutorial and Practical Examples

Related Articles
ABOUT
 sqlmap 0.9 added to online security scans
 Guide to Nessus 4 on Ubuntu 9.04
From attack surface discovery to vulnerability identification, we host tools to make the job of
 Bing Azure API with a simple Python script under Ubuntu
securing your systems easier.
 BackTrack 4 Release

Membership
We Learnthat
use cookies to ensure More
we give you the best experience on our site. If you continue to use this site we
assume that you accept this.
Ok
14 of 15 1/5/24, 16:03
Recon-NG Tutorial | HackerTarget.com https://hackertarget.com/recon-ng-tutorial/

CONNECT

  

MAILING LIST

Subscribe to the Low Volume List

 Your Email Subscribe

Security News, Site Updates and Tool Usage

Copyright © Hacker Target Pty Ltd 2023 - ACN 600827263 | Terms of Use and Privacy Policy | Powered by
Open Source Software

We use cookies to ensure that we give you the best experience on our site. If you continue to use this site we
assume that you accept this.
Ok
15 of 15 1/5/24, 16:03

You might also like