Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
TV & Film
Technology
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/72/9c/78/729c78c8-dd4a-83f1-d865-c815a52fcb4a/mza_18143718259370525373.jpg/600x600bb.jpg
CyberCode Academy
CyberCode Academy
62 episodes
17 hours ago
Welcome to CyberCode Academy — your audio classroom for Programming and Cybersecurity.
🎧 Each course is divided into a series of short, focused episodes that take you from beginner to advanced level — one lesson at a time.
From Python and web development to ethical hacking and digital defense, our content transforms complex concepts into simple, engaging audio learning.
Study anywhere, anytime — and level up your skills with CyberCode Academy.
🚀 Learn. Code. Secure.
Show more...
Courses
Education,
Technology
RSS
All content for CyberCode Academy is the property of CyberCode Academy and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Welcome to CyberCode Academy — your audio classroom for Programming and Cybersecurity.
🎧 Each course is divided into a series of short, focused episodes that take you from beginner to advanced level — one lesson at a time.
From Python and web development to ethical hacking and digital defense, our content transforms complex concepts into simple, engaging audio learning.
Study anywhere, anytime — and level up your skills with CyberCode Academy.
🚀 Learn. Code. Secure.
Show more...
Courses
Education,
Technology
https://d3wo5wojvuv7l.cloudfront.net/t_rss_itunes_square_1400/images.spreaker.com/original/8c17dad8737e57931cfa75b31fb57920.jpg
Course 8 - Penetration Testing OSINT Gathering with Recon-ng | Episode 1: Recon-ng Installation, Shell Exploration and Data Management
CyberCode Academy
9 minutes
5 days ago
Course 8 - Penetration Testing OSINT Gathering with Recon-ng | Episode 1: Recon-ng Installation, Shell Exploration and Data Management
In this lesson, you’ll learn about: Recon-ng Installation, Shell Navigation, and Data Management for Penetration Testing 1. Installation and Environment Setup Recon-ng is a powerful OSINT framework designed for information gathering in penetration testing. Installation options:
  • Linux (Kali Linux): Pre-installed, straightforward to use.
  • Other Linux (Ubuntu): Clone the repository using Git from Bitbucket; requires Python 2 (Python 3 not supported).
  • Windows or Mac: Run via Docker or a VirtualBox VM.
  • Dependencies: Install Python packages via pip install -r requirements.
  • API Credentials: Initial launch may show errors; these are addressed when configuring modules later.
2. Exploring the Special Shell and Data Management After launching, Recon-ng opens a custom shell (not Bash). Key elements: a. Commands
  • View top-level commands using:
    help
b. Workspaces
  • Projects are organized into workspaces.
  • Default workspace is created automatically.
  • Manage workspaces with:
    • workspaces add → create new workspace
    • workspaces select → switch workspace
  • Each workspace contains a hidden folder with:
    • data.db → project database
    • Generated report documents
  • The active workspace is shown in the prompt.
c. Database Structure
  • Around 20 tables, including:
    • domains
    • companies
    • credentials
  • Tables store critical project data used by modules.
d. Adding and Viewing Data
  • Add data using add :
  • Example: add domains bbc.com
Example: add companies ExampleCorpView data using:show domainsshow companiesNote: Creating a workspace uses workspaces add instead of add workspaces.3. Modules and Running Scans Modules are scripts that perform specific reconnaissance tasks. Recon-ng currently has around 90 modules. Workflow:Select module:
use Review info:
show info → check required settings and usage instructions.Run module:
run → uses database data (e.g., domains) for scans.Modules can perform actions like web scans, domain enumeration, or credential searches. 4. Viewing Database via Web Interface Recon-ng provides a web interface via recon-web:
Start the server from the Recon-ng directory.Access via: http://localhost:5000 or 127.0.0.1:5000Features: Click a workspace → view database tables and content.5. SummaryRecon-ng organizes projects using workspaces and database tables, enabling structured information gathering.Modules automate reconnaissance tasks using stored data.The custom shell and optional web interface provide flexible ways to manage projects.Understanding workspaces, database tables, and module workflows is critical for effective OSINT and penetration testing.

You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cybercode_academy
CyberCode Academy
Welcome to CyberCode Academy — your audio classroom for Programming and Cybersecurity.
🎧 Each course is divided into a series of short, focused episodes that take you from beginner to advanced level — one lesson at a time.
From Python and web development to ethical hacking and digital defense, our content transforms complex concepts into simple, engaging audio learning.
Study anywhere, anytime — and level up your skills with CyberCode Academy.
🚀 Learn. Code. Secure.