Today we're continuing Module one and Cyber is crafting the perfect email course, and we're gonna hop over into another one of my favorite tools, re Kon and G. Let's go ahead and get started.
So first, what is re kon en g?
Rico and G is another really popular ocean tool just like the harvester. It's a fully featured Web re kon framework, and it's used in a similar fashion to medicine. Point
Re Kon en G was written in python, which makes it really easy to use and even contribute to.
It has a ton of it for Montrose built in including modules for re kon reporting, exploitation and discovery.
So what are modules, modules and recounting G R custom scripts? Little perform a certain action just like in medicine.
So how we use re kon en g.
So again, recon Angie is used in a very similar fashion to the Madis Lloyd framework. If you've been an offensive security of dining the security before, you're probably pretty familiar with that. But if not, it's not too bad get used to, and I'm gonna show you just a couple quick things real quick,
so let's go ahead and hop right in to our Callie box.
All right, so you can see it's already got my user name here, root. And again, I've got the default password route backwards, which is tour Glenn hit Unlock
and you open re kon en G. All we need to do is click your terminal
make this big
and all you need to do is type in re Kon dash
and G press center
Any time you open and you will see all these errors here,
don't be too worried about that. All it's telling you is that you haven't added any AP eyes or set any keys
so you won't be able to use those modules. So you can see here. We do have our 76 Rica modules built in eight, reporting
exploitation and discovery.
So at this main page, if you do
have any questions or you're not sure where to go, just like with most Lennox tools, you just type in help in press enter,
and that will tell you the commands that are available at this screen. So we've got add back, delete a few more. You're sad shell, of course, and work spaces,
if you'd like to use one of these commands, but you're not sure how
taping the command will start just with add and you type in help right after him.
It enter, and they don't actually tell you how to use that command. So we're not gonna go too deep into recon Angie right now. We're saving that for another, Labs will hop back into our slide show.
So looks confusing, right? Don't be scared, though. So again, when you're at that recon Ngema new or any menu, once you're in, you can type help. And then I'll give you the commands that are available to you before even launching it. You can actually type in re Kon Dash N G dash, dash help. And that will give you,
Ah, few different things.
She can see your version number and things like them.
So the basic command structure of retirement in G
use the module
and you can do that by typing the word use and then the module, path and name
set your source
and again, that's a simple a set and then source
Once you type, run, press enter and it'll go ahead and run. That module.
All right, we're going
to give just a real quick quiz to end this lesson.
So one How do you launch re Kon en G?
Just issue the re kon dash N G. Command at the terminal. You can't actually select it from the gooey as well.
So number two, what is recon Angie written in? What language is recon Angie written in?
That's right. It's python. Which makes it really easy to modify or contribute to, if you'd like.
And this one will go just a little bit deeper. How do you set your source?
Simple asset and then source.
Lastly, how do you execute your module?
This one's one. You definitely want to know.
Yep. Just runnin impress center.
All right. So coming up, we're gonna go ahead and hop into our labs. Let's make sure you do have your either Cali linens or boost Corlin. Xbm set up
and we're gonna jump right in
Ethical Hacking (CEH Preparation)
Master the core techniques and technologies of penetration testing and ethical hacking and assess the ...
Incident Response Lifecycle
This intermediate-level course will provide the student with in-depth instruction on the lifecycle of cybersecurity ...
5 CEU/CPE Hours Available
Certificate of Completion Offered