Course 8 - Penetration Testing OSINT Gathering with Recon-ng | Episode 1: Recon-ng Installation, Shell Exploration and Data Management
Update: 2025-11-15
Description
In this lesson, you’ll learn about: Recon-ng Installation, Shell Navigation, and Data Management for Penetration Testing 1. Installation and Environment Setup Recon-ng is a powerful OSINT framework designed for information gathering in penetration testing. Installation options:
use Review info:
show info → check required settings and usage instructions.Run module:
run → uses database data (e.g., domains) for scans.Modules can perform actions like web scans, domain enumeration, or credential searches. 4. Viewing Database via Web Interface Recon-ng provides a web interface via recon-web:Start the server from the Recon-ng directory.Access via: http://localhost:5000 or 127.0.0.1:50 00Features: Click a workspace → view database tables and content.5. SummaryRecon-ng organizes projects using workspaces and database tables, enabling structured information gathering.Modules automate reconnaissance tasks using stored data.The custom shell and optional web interface provide flexible ways to manage projects.Understanding workspaces, database tables, and module workflows is critical for effective OSINT and penetration testing.
You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cybercode_academy
- Linux (Kali Linux): Pre-installed, straightforward to use.
- Other Linux (Ubuntu): Clone the repository using Git from Bitbucket; requires Python 2 (Python 3 not supported).
- Windows or Mac: Run via Docker or a VirtualBox VM.
- Dependencies: Install Python packages via pip install -r requirements.
- API Credentials: Initial launch may show errors; these are addressed when configuring modules later.
- View top-level commands using:
help
- Projects are organized into workspaces.
- Default workspace is created automatically.
- Manage workspaces with:
- workspaces add → create new workspace
- workspaces select → switch workspace
- Each workspace contains a hidden folder with:
- data.db → project database
- Generated report documents
- The active workspace is shown in the prompt.
- Around 20 tables, including:
- domains
- companies
- credentials
- Tables store critical project data used by modules.
- Add data using add :
- Example: add domains bbc.com
use Review info:
show info → check required settings and usage instructions.Run module:
run → uses database data (e.g., domains) for scans.Modules can perform actions like web scans, domain enumeration, or credential searches. 4. Viewing Database via Web Interface Recon-ng provides a web interface via recon-web:Start the server from the Recon-ng directory.Access via: http://localhost:5000 or 127.0.0.1:50 00Features: Click a workspace → view database tables and content.5. SummaryRecon-ng organizes projects using workspaces and database tables, enabling structured information gathering.Modules automate reconnaissance tasks using stored data.The custom shell and optional web interface provide flexible ways to manage projects.Understanding workspaces, database tables, and module workflows is critical for effective OSINT and penetration testing.
You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cybercode_academy
Comments
In Channel























