User:Zbeggy

= Recon-ng =

Recon-ng is a an open source penetration testing software. It encompases a wide variety of built in modules and features. These along with other automated scripting allows for an easy to use interface. It was developed by Tim Tomes in Phyton and sponsered by https://www.blackhillsinfosec.com/. The repository for Recon-ng can be found on https://Github.com/lanmaster53/recon-ng with the most recent version being v5.0.2 dating Spetember 10th, 2019.

API's
Recon-ng utilizes API's as part of its reconnaissance efforts. These range from common free API's to purchasable API's. In addition some APIs require special authentication to connect with other external companies. By imploying some of these third parrty API's you can gain additional funcationality that would be beneficial for penetration testing or reporting.

Common API's:

 * Bing
 * Google
 * Flickr
 * Twitter

Features
As I mentioned Recon-ng has a good amount of features baked into its design. These range from useful command completion to the inclusion of market place modules. This allows user to "search, analyze, and remove modules" By utilizing these features penetration testers are able to tailor their testing to the environment that they are going to be scanning.

Ethical Hacking Resources
Here are some additional resources that might be helpful when deploying Recon-ng. These articles can be used for general information about Recon-ng or even introductory processes to using it. Keep in mind that using a powerful tool like Recon-n should be used for the good of information security. With Recon-ng you can "Find targets and move to discovering vulnerabilities."


 * http://www.admin-magazine.com/Archive/2015/30/Web-based-reconnaissance
 * https://hackingblogs.com/learn-recon-ng/
 * https://www.securitynewspaper.com/2018/11/23/recon-ng-good-tool-for-information-gathering/
 * https://hackertarget.com/recon-ng-tutorial/

Wikipedia Link

 * Metasploit Project