Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
TV & Film
Technology
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/72/9c/78/729c78c8-dd4a-83f1-d865-c815a52fcb4a/mza_18143718259370525373.jpg/600x600bb.jpg
CyberCode Academy
CyberCode Academy
62 episodes
21 hours ago
Welcome to CyberCode Academy — your audio classroom for Programming and Cybersecurity.
🎧 Each course is divided into a series of short, focused episodes that take you from beginner to advanced level — one lesson at a time.
From Python and web development to ethical hacking and digital defense, our content transforms complex concepts into simple, engaging audio learning.
Study anywhere, anytime — and level up your skills with CyberCode Academy.
🚀 Learn. Code. Secure.
Show more...
Courses
Education,
Technology
RSS
All content for CyberCode Academy is the property of CyberCode Academy and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Welcome to CyberCode Academy — your audio classroom for Programming and Cybersecurity.
🎧 Each course is divided into a series of short, focused episodes that take you from beginner to advanced level — one lesson at a time.
From Python and web development to ethical hacking and digital defense, our content transforms complex concepts into simple, engaging audio learning.
Study anywhere, anytime — and level up your skills with CyberCode Academy.
🚀 Learn. Code. Secure.
Show more...
Courses
Education,
Technology
https://d3wo5wojvuv7l.cloudfront.net/t_rss_itunes_square_1400/images.spreaker.com/original/c363d9df194020283d8b6eedfe5a6fe6.jpg
Course 8 - Penetration Testing OSINT Gathering with Recon-ng | Episode 2: Modules, Data Flow, Naming Structure, API Keys
CyberCode Academy
10 minutes
4 days ago
Course 8 - Penetration Testing OSINT Gathering with Recon-ng | Episode 2: Modules, Data Flow, Naming Structure, API Keys
In this lesson, you’ll learn about: Mastering Recon-ng Module Operations, Data Flow, Naming Structure, API Integration & Session Automation 1. Understanding Module Functionality To operate any module correctly, analysts must inspect its requirements using:
  • show info — displays the module’s:
    • Name
    • Description
    • Required and optional inputs
    • Source and destination database tables
This command is essential before running any module because it defines what data the module needs and what data it will produce. 2. Data Flow and Interaction Recon-ng modules depend heavily on structured input/output flows:
  • Modules read from specific database tables (e.g., domains, hosts)
  • Then write results to other tables (e.g., contacts, repositories)
Understanding this flow is critical for chaining modules efficiently. 3. Module Chaining and Dependency Modules are often dependent on data gathered by earlier modules. Examples:
  • Use a domain enumeration module (e.g., google_site_web)
    → populates the hosts table
  • Then run a discovery module (e.g., interesting_files)
    → requires the hosts table to be populated to search for files
This process is known as module chaining, forming a structured intelligence pipeline. 4. Database Querying Recon-ng allows advanced database searches:
  • query command → perform SQL-like lookups
  • run + SQL syntax → filter large datasets
Example use case:
Retrieve contacts belonging to one domain instead of dumping the entire contacts table. This improves workflow efficiency when processing large OSINT datasets. 5. Module Configuration Modules can be customized using:
  • set → assign a value (e.g., limit results, pick target subdomains)
  • unset → remove the assigned value
Modules also store collected artifacts (such as downloaded files) inside the workspace directory under the .recon-ng path. 6. Module Naming Structure Recon-ng organizes modules into logical categories such as:
  • Reconnaissance
  • Reporting
  • Import
  • Discovery
The naming scheme for Reconnaissance modules is especially important:
  • Each module name reflects the source → destination flow
    • Example: domains-hosts means “take domains and discover hosts”
  • Common tables used include:
    • companies
    • contacts
    • domains
    • hosts
    • netblocks
    • profiles
    • repositories
This structure makes it easy to understand what each module does simply from its name. 7. API Key Management Some modules rely on external APIs (e.g., BuiltWith, Jigsaw). Key commands:
  • keys add → configure an API key
  • show keys → list all installed keys
Without keys, these modules will fail or return limited data. 8. Session Scripting & Automation Recon-ng supports automation to streamline repetitive assessments. Tools covered include: a. Command Recording
  • record start → begin recording commands
  • record stop → stop recording
  • Run recorded script using:
    recon-ng -r
This allows you to reproduce actions automatically. b. Full Session Logging
  • spool → log everything output in the session
    Useful for audits, reporting, and compliance documentation.
Summary This lesson teaches students how to:
  • Understand module requirements (show info)
  • Chain modules effectively using database-driven workflows
  • Customize modules with set and unset
  • Use Recon-ng’s SQL-like querying for...
CyberCode Academy
Welcome to CyberCode Academy — your audio classroom for Programming and Cybersecurity.
🎧 Each course is divided into a series of short, focused episodes that take you from beginner to advanced level — one lesson at a time.
From Python and web development to ethical hacking and digital defense, our content transforms complex concepts into simple, engaging audio learning.
Study anywhere, anytime — and level up your skills with CyberCode Academy.
🚀 Learn. Code. Secure.