Hi. Today we're continuing module one, and Cyber is crafting the perfect female course using re kon en G. So the next few sections are all going to be lab based. So we want to make sure that you've got your lab built with either a Cali linens, VM any other linens? VM as long as it's got re kon en g installed
or even a Cali Lennox
or Ray Lennox hard box. So let's go ahead and hop right in.
So in this video, we're gonna go over just a couple of things. First, we're gonna go over the common commands and navigation of re Kon en G.
If you've ever used medicine, but you will notice it is very similar, um, layout and
pretty easy to use.
Um, nothing. We're gonna go over this video, our work spaces. So what? Our work spaces. When you log into re kon en g, you will see the prompt re kon en g and then in brackets default.
So that is the default. Workspaces and workspaces are used to organize any information that you gather
and make it easy to keep things separate. So if you're doing re con on a couple different organizations or anything like that you can keep all that information on your database is separate.
So let's go ahead and hop right into our lab
and start using re Kon and G.
So, as you can see here we are at our long and prompt. And if you've got your default still set up, it is just roots
with the password of tour. And that is just tea.
Oh, our route backwards. So we'll let this log us in here.
All right? So you can see we are at our county desktop now, so it's going to open up a terminal,
make us a little bit bigger, and we're going to start re Kon and G, and you start re Kon Angie again. If you missed the last lab just by typing in the re kon en g, Come in
and pressing. Enter
when you start up, Rico Energy and you see all these, uh, squeaky looking errors here, Um, all it's telling you is that he's a p I keys Aire not set up. See, you won't be able to use these modules without it failing.
All right, So what I like to do stern off with a clear
workspace. So it's going just type in clear and press enter.
So one of the first command you need to get familiar with is the show command. You can use that at any time when you're in recon mg, and it will tell you what commands are available. So right now we can show cos contacts, credentials, the dash word Domi, any domain set up
or in this case, we're gonna show workspaces
all right, and even see, I actually have ah lab work's based set up already. So let's go ahead and switch over to that.
It's the way we do that is with the workspaces command.
If you press enter, we'll tell you how to use that commune. So we've already listed them. We're going to select one now, Um,
and actually, what will deal? It's going to delete our lab one,
and then we're going to add our lab one.
All right, so we've added a workspace again. You'll see our A p I errors. Not a big deal.
What's type in clear and you will see Now we are in our lab work space.
I'm glad. Show workspaces one more times to make sure everything is
there. Yep. So we can see our workspaces default and lab. So let's go ahead and get ready for our first scan using re kon en G. And first thing I always want to do is make sure my domain is set up performing a phishing attack. We're going to need to know where we're gonna try and look
for these email addresses. So let's go ahead and just add domains and we're going to dis use google dot com This is where you would put in any domain that you're actually going to do. Recon on Seacon doing cyber Don t or Emma send just whatever that company's domain is.
And next thing I like to do I'd like to stay organized is at our companies. And if you just press enter here, it will prompt you for exactly what you need. So the company text is just gonna be Google, and the description is going to be Google company.
And again, you can just type in whatever you want. So let's go ahead and verify information again. We're gonna use that show. Come in.
Excellent show. Argo means
boom. So we've got our google dot com set up as our default domain
and let's go and show companies
and you can see we've got Google is set up as the company, and our
description is set up there as well.
And that is all for today's lap. It was just a really basic rundown of re kon en g just to get you familiar with it. One of the best ways to kind of
find your way around and is actually just use it so kind of
browse. We run those show commands,
see what we've got available.
Nothing set up their sword dashboard,
and this is probably gonna give us nothing as well.
type of thing, right? So right now, we haven't done any
activity in this workspace, So let's go ahead and go back and end this module just a real quick Who is?
All right. So for today's quiz, one of the first questions we have is what our work spaces.
That's right. Workspaces are areas to keep your re kon organized and separates all your databases. They're gonna be behind those work spaces.
So how do you change from one workspace to another?
That's right. So when you're at any of the re kon en GI problems. You just type in the workspaces Kenyon
select and then the workspace name that you want to change too.
And what command can you use
to see one other commands are available,
and this is definitely one you want to know. And that is that show community again. You can use at any time your or any where you're at in recon Angie, and we'll show you any of the available commands.
So that's it for today's module. Now that we are familiar with the basics of re Kon en G, though we are going to do some scans in that next one
Students will send a phishing email using the Social Engineering Toolkit. Students will then impersonate ...
Phishing Skill Assessment
Phishing is the act of attempting to obtain confidential/personal information and/or funds about the target ...