Recon-ng – advanced reconnaissance framework

My buddy Aamir Lakhani wrote about a cool reconnaissance tool called recon-ng. This tool can automate researching a target using multiple sources. The original post can be found HERE
Reconnaissance techniques are the one of the first steps penetration testers practice when learning how to exploit systems for vulnerabilities. Traditional reconnaissance techniques are used to gather intelligence, define scope, and identifying weaknesses.

The issue with reconnaissance is that is takes it time. In most cases, penetration testers do not have the luxury of time that at motivated attacker is going to have. I cannot stress the importance of reconnaissance. However, if you assume over a long period of time attackers will be able to gather intelligence, then methods such as credential white box penetration testing starts to make sense. Recon-ng is a tool that allows penetration testers to speed up advanced reconnaissance.

>Recon-ng is a framework. It is a very powerful, flexible, and has moving parts similar to the Metasploit framework. Recon-ng is an interactive framework that is not a menu driven UI. Recon-ng uses many different sources to gather data. Some of these sources are Google, Twitter, and Showdan. Some of these modules require paid APIs (other APIs are free, and some Recon-ng modules require no APIs).
Installing recon-ng on Kali Linux

We are going to install recon-ng on Kali Linux. To install recon-ng and place it in the opt directory, we are going to use git clone by typing in the following command in the terminal window.
cd /opt; git clone https://[email protected]/LaNMaSteR53/recon-ng.git

cd /opt/recon-ng

./recon-ng

Installing-Recon-ng-1024x626

Starting-recon-ng-1024x621

Recon-ng is an open-source framework coded in python by Tim Tomes a.k.a LaNMaSteR53. Its interface is modeled after the look of the Metasploit Framework but it is not for exploitation or for spawning a meterpreter session or a shell, it is for web-based reconnaissance and information gathering. It is not a menu driven UI. Do not type numbers. Use commands or type help.
It comes with modules to support your web reconnaissance adventure and information gathering just like Metasploit’s auxiliary and exploit modules. The modules pre-loaded for this framework are categorized into Auxiliary, Contacts, Hosts, Output, and Pwnedlist module types.

You can view the modules by typing show modulesshow-modules-recon-ng-1024x617My-IP-Neighbors Lookup is a recon module contributed by Micah Hoffman which checks and leverages my-ip-neighbors.com site for other hosts hosted on the same server. This is useful because it let’s you discovery relationships. It is possible your target hosts website could be hosted on a shared system with other sites that have vulnerabilities or exploits. In the following example we see DrChaos.com web server shares the same server with any other hosts.recon-ng-ip-neigh-1024x282Okay, my web host has me on the same server as revenge.info and boobzworld.com and scaledrop.com.recon-ng-ip-nei-results-1024x601

Other types of common reconnaissance methods include:

Whois

Google Adsense

Search Engine

DNS Brute force

Geolocation.

In the next module we will take password hashes and see if we can match them against the Adobe password breach. This assumes we have password hashes that can be checked against the Adobe leaked hashes.recon-ng-adobe-password-hash-crack-1024x573

You can see from the example above our first hash was for the password 123456. Our second hash was for the password superman.

Now we will use the Have I Been Pwned Module to check if any user names we may have are compromised from any publicly known breaches.weiss-boxee-breach-1024x644
We can see the username [email protected] was breached from Boxee. If I knew this user’s hash or password, I could see if they had used it anywhere else. This type of reconnaissance is one of the strengths of recon-ng. You will in most instances need to use multiple modules to get the information you want.

Lastly, recon-ng puts all the information in learns into nice exportable reports.recon-ng-report-module--1024x638There is not much in this report, but when you start running multiple modules and add in geolocation reports can get pretty complex, and recon-ng does a great job keeping track of everything.navigating-to-my-report-recon-ng-300x62recon-ng-report-blank-1024x451recon-report-2-300x157

Recon-ng is a great framework to start your research. You will need to use multiple modules together to make a bigger picture and gather useable intelligence. Many of the modules require paid or free APIs.

4 thoughts on “Recon-ng – advanced reconnaissance framework”

  1. Nice post. Installing it was a breeze. Most of the modules that do anything interesting (as stated in the article) require an API key – many of them are free. Haven’t used this tool before – usually start off with a stealth nmap scan, but will try this technique at work.

    [WORDPRESS HASHCASH] The poster sent us ‘0 which is not a hashcash value.

    1. Cool glad you found it useful. Search for hacking on this site or my buddy’s site Drchaos to find other free tools. Also our book (shameless promotion) has a ton of useful info. Thanks for the feedback!

  2. Holy crap this site makes you go thru a ton of hoops to post a comment. Is this really a security measure or do you hate people with greasy fingers – lol

    [WORDPRESS HASHCASH] The poster sent us ‘0 which is not a hashcash value.

    1. You would be surprised the amount of SPAM I receive every nano second of the day. I’m talking anything from porn links to discounted nike shoes. By default most of it is dropped but I still have to sort through hundreds of crap. Then there are the annoying botnets just posting stupid comments such as “I like really content of your site .. yes happy”. So sorry for the hoops to post a comment but without those, I would have billions of spam posts masking real posts from cool people like you.

Leave a Reply to John roberts Cancel reply

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.