# Recon-ng

# References

Web-based reconnaissance tool.

# Examples of execution

Whois search email:

$ recon-ng
[recon-ng][default] > use recon/domains-contacts/whois_pocs
[recon-ng][default][whois_pocs] > set SOURCE orange.com
SOURCE => orange.com
[recon-ng][default][whois_pocs] > run

----------
ORANGE.COM
----------
[*] URL: http://whois.arin.net/rest/pocs;domain=orange.com
[*] URL: http://whois.arin.net/rest/poc/ABUSE3681-ARIN
...

Try to find vuln on Open Bug Bounty:

[recon-ng][default] > use recon/domains-vulnerabilities/xssposed
[recon-ng][default][xssposed] > set SOURCE orange.com
SOURCE => orange.com
[recon-ng][default][xssposed] > run

----------
ORANGE.COM
----------
[*] Category: XSS
[*] Example: https://www.orange.com
[*] Host: orange.com
[*] Publish_Date: 2017-09-27 12:36:50
[*] Reference: https://www.openbugbounty.org/reports/316983/
[*] Status: fixed
[*] --------------------------------------------------
...

Find sub-domains:

[recon-ng][default] > use recon/domains-hosts/google_site_web
[recon-ng][default][google_site_web] > set SOURCE orange.com
SOURCE => orange.com
[recon-ng][default][google_site_web] > run

----------
ORANGE.COM
----------
[*] Searching Google for: site:orange.com
[*] [host] www.orange.com (<blank>)
[*] [host] recargas.orange.com (<blank>)
...