Phishing

Course
Time
1 hour 30 minutes
Difficulty
Beginner
CEU/CPE
2

Video Transcription

00:03
Hi. Today we're continuing module one, and Cyber is crafting the perfect female course using re kon en G. So the next few sections are all going to be lab based. So we want to make sure that you've got your lab built with either a Cali linens, VM any other linens? VM as long as it's got re kon en g installed
00:23
or even a Cali Lennox
00:24
or Ray Lennox hard box. So let's go ahead and hop right in.
00:30
So in this video, we're gonna go over just a couple of things. First, we're gonna go over the common commands and navigation of re Kon en G.
00:38
If you've ever used medicine, but you will notice it is very similar, um, layout and
00:45
pretty easy to use.
00:47
Um, nothing. We're gonna go over this video, our work spaces. So what? Our work spaces. When you log into re kon en g, you will see the prompt re kon en g and then in brackets default.
00:59
So that is the default. Workspaces and workspaces are used to organize any information that you gather
01:07
and make it easy to keep things separate. So if you're doing re con on a couple different organizations or anything like that you can keep all that information on your database is separate.
01:18
So let's go ahead and hop right into our lab
01:22
and start using re Kon and G.
01:26
So, as you can see here we are at our long and prompt. And if you've got your default still set up, it is just roots
01:32
with the password of tour. And that is just tea.
01:36
Oh, our route backwards. So we'll let this log us in here.
01:47
All right? So you can see we are at our county desktop now, so it's going to open up a terminal,
01:53
make us a little bit bigger, and we're going to start re Kon and G, and you start re Kon Angie again. If you missed the last lab just by typing in the re kon en g, Come in
02:02
and pressing. Enter
02:06
when you start up, Rico Energy and you see all these, uh, squeaky looking errors here, Um, all it's telling you is that he's a p I keys Aire not set up. See, you won't be able to use these modules without it failing.
02:20
All right, So what I like to do stern off with a clear
02:23
workspace. So it's going just type in clear and press enter.
02:27
So one of the first command you need to get familiar with is the show command. You can use that at any time when you're in recon mg, and it will tell you what commands are available. So right now we can show cos contacts, credentials, the dash word Domi, any domain set up
02:45
or in this case, we're gonna show workspaces
02:49
all right, and even see, I actually have ah lab work's based set up already. So let's go ahead and switch over to that.
02:57
It's the way we do that is with the workspaces command.
03:00
If you press enter, we'll tell you how to use that commune. So we've already listed them. We're going to select one now, Um,
03:12
and actually, what will deal? It's going to delete our lab one,
03:16
and then we're going to add our lab one.
03:21
All right, so we've added a workspace again. You'll see our A p I errors. Not a big deal.
03:27
What's type in clear and you will see Now we are in our lab work space.
03:38
I'm glad. Show workspaces one more times to make sure everything is
03:44
there. Yep. So we can see our workspaces default and lab. So let's go ahead and get ready for our first scan using re kon en G. And first thing I always want to do is make sure my domain is set up performing a phishing attack. We're going to need to know where we're gonna try and look
04:00
for these email addresses. So let's go ahead and just add domains and we're going to dis use google dot com This is where you would put in any domain that you're actually going to do. Recon on Seacon doing cyber Don t or Emma send just whatever that company's domain is.
04:20
And next thing I like to do I'd like to stay organized is at our companies. And if you just press enter here, it will prompt you for exactly what you need. So the company text is just gonna be Google, and the description is going to be Google company.
04:39
And again, you can just type in whatever you want. So let's go ahead and verify information again. We're gonna use that show. Come in.
04:46
Excellent show. Argo means
04:48
boom. So we've got our google dot com set up as our default domain
04:54
and let's go and show companies
04:57
and you can see we've got Google is set up as the company, and our
05:00
description is set up there as well.
05:09
And that is all for today's lap. It was just a really basic rundown of re kon en g just to get you familiar with it. One of the best ways to kind of
05:18
find your way around and is actually just use it so kind of
05:23
browse. We run those show commands,
05:26
see what we've got available.
05:29
Nothing set up their sword dashboard,
05:33
and this is probably gonna give us nothing as well.
05:35
Oops,
05:39
type of thing, right? So right now, we haven't done any
05:43
activity in this workspace, So let's go ahead and go back and end this module just a real quick Who is?
05:54
All right. So for today's quiz, one of the first questions we have is what our work spaces.
06:04
That's right. Workspaces are areas to keep your re kon organized and separates all your databases. They're gonna be behind those work spaces.
06:13
So how do you change from one workspace to another?
06:20
That's right. So when you're at any of the re kon en GI problems. You just type in the workspaces Kenyon
06:28
select and then the workspace name that you want to change too.
06:33
And what command can you use
06:35
to see one other commands are available,
06:41
and this is definitely one you want to know. And that is that show community again. You can use at any time your or any where you're at in recon Angie, and we'll show you any of the available commands.
06:55
So that's it for today's module. Now that we are familiar with the basics of re Kon en G, though we are going to do some scans in that next one
07:05
stay tuned.

Up Next

Phishing

In this online course, you will learn how to craft the perfect phishing email to allow you to teach your team how to avoid actual phishing attempts.

Instructed By

Instructor Profile Image
Dustin Parry
Network Security Engineer
Instructor