Recon-ng Pi

DISCLAIMER

Any actions and or activities related to the material contained within this Website is solely your responsibility. The misuse of the information in this website can result in criminal charges brought against the persons in question. Cyber Security Associates Limited, will not be held responsible for any criminal charges brought against any individuals misusing the information in these projects to break the law.

Please ensure you are using the latest SD Card image which is available here.

 

Learning Outcomes

  • Understand how websites have sub domains that help to separate different pages;

  • Understand how knowing the sub domains of a website is helpful in “ethical” hacking;

  • Use recon-ng to map websites.

 

Hardware Required

Component Number (Peli Case)

(Base) 4 & 5 

(Level 1) 3 

(Base) 5 

(Base) 9 

(Level 1) 3 

(Level 1) 3 

(Level 1) 5 

(Level 1) 1 

Component Number (Box Case)

Slot 1

Slot 11

Slot 11

Slot 2

Slot 11

Slot 11

Slot 12

Slot 13

Component

Raspberry Pi + Case 

USB Cable 

Kali SD Card 

TFT Screen 

HDMI Cable 

Keyboard 

Mouse 

Power Supply Unit 

 

Video Guide

 

conclusion

Within the penetration testing industry there are multiple companies dedicated to web application hacking. Its popularity has increased as more industries are connecting a range of services to their websites and creating subdomains which can access sensitive information if you can get inside (legitimately or illegally). Multiple resources are dedicated to protect these portals and this is why it is important to understand how both the internet works and how websites/domains work and their relationship to subdomains. Knowing how a domain is laid out is like having a map, instead of stumbling in the dark, hoping you might accidentally come across a vulnerable subdomain you can see exactly where it is and not waste time getting to it.