Phishing

Course
Time
2 hours
Difficulty
Beginner
CEU/CPE
2

Video Transcription

00:03
Today we're continuing Module one and Cyber is crafting the perfect email course, and we're gonna hop over into another one of my favorite tools, re Kon and G. Let's go ahead and get started.
00:15
So first, what is re kon en g?
00:18
Rico and G is another really popular ocean tool just like the harvester. It's a fully featured Web re kon framework, and it's used in a similar fashion to medicine. Point
00:28
Re Kon en G was written in python, which makes it really easy to use and even contribute to.
00:35
It has a ton of it for Montrose built in including modules for re kon reporting, exploitation and discovery.
00:45
So what are modules, modules and recounting G R custom scripts? Little perform a certain action just like in medicine.
00:57
So how we use re kon en g.
01:00
So again, recon Angie is used in a very similar fashion to the Madis Lloyd framework. If you've been an offensive security of dining the security before, you're probably pretty familiar with that. But if not, it's not too bad get used to, and I'm gonna show you just a couple quick things real quick,
01:15
so let's go ahead and hop right in to our Callie box.
01:23
All right, so you can see it's already got my user name here, root. And again, I've got the default password route backwards, which is tour Glenn hit Unlock
01:34
and you open re kon en G. All we need to do is click your terminal
01:38
make this big
01:41
and all you need to do is type in re Kon dash
01:45
and G press center
01:47
Any time you open and you will see all these errors here,
01:51
don't be too worried about that. All it's telling you is that you haven't added any AP eyes or set any keys
01:57
so you won't be able to use those modules. So you can see here. We do have our 76 Rica modules built in eight, reporting
02:06
exploitation and discovery.
02:08
So at this main page, if you do
02:13
have any questions or you're not sure where to go, just like with most Lennox tools, you just type in help in press enter,
02:20
and that will tell you the commands that are available at this screen. So we've got add back, delete a few more. You're sad shell, of course, and work spaces,
02:30
if you'd like to use one of these commands, but you're not sure how
02:35
taping the command will start just with add and you type in help right after him.
02:39
It enter, and they don't actually tell you how to use that command. So we're not gonna go too deep into recon Angie right now. We're saving that for another, Labs will hop back into our slide show.
02:54
Oh, right.
02:58
So looks confusing, right? Don't be scared, though. So again, when you're at that recon Ngema new or any menu, once you're in, you can type help. And then I'll give you the commands that are available to you before even launching it. You can actually type in re Kon Dash N G dash, dash help. And that will give you,
03:16
Ah, few different things.
03:19
She can see your version number and things like them.
03:22
So the basic command structure of retirement in G
03:25
is
03:27
use the module
03:28
and you can do that by typing the word use and then the module, path and name
03:34
set your source
03:36
and again, that's a simple a set and then source
03:39
and then
03:40
run.
03:43
Once you type, run, press enter and it'll go ahead and run. That module.
03:50
All right, we're going
03:52
to give just a real quick quiz to end this lesson.
03:58
So one How do you launch re Kon en G?
04:04
That's right.
04:05
Just issue the re kon dash N G. Command at the terminal. You can't actually select it from the gooey as well.
04:15
So number two, what is recon Angie written in? What language is recon Angie written in?
04:25
That's right. It's python. Which makes it really easy to modify or contribute to, if you'd like.
04:31
And this one will go just a little bit deeper. How do you set your source?
04:40
Simple asset and then source.
04:44
Lastly, how do you execute your module?
04:46
This one's one. You definitely want to know.
04:51
Yep. Just runnin impress center.
04:55
All right. So coming up, we're gonna go ahead and hop into our labs. Let's make sure you do have your either Cali linens or boost Corlin. Xbm set up
05:04
and we're gonna jump right in

Up Next

Phishing

In this online course, you will learn how to craft the perfect phishing email to allow you to teach your team how to avoid actual phishing attempts.

Instructed By

Instructor Profile Image
Dustin Parry
Network Security Engineer
Instructor