Information Gatheringreconnaissancewebframeworkmodulesxssvulnerabilitiesdomains

Recon-ng

Recon-ng is a full-featured Web Reconnaissance framework written in Python for conducting open source web-based reconnaissance quickly and thoroughly. It features independent modules, database interaction, and a Metasploit-like interface.

Description

Recon-ng provides a powerful environment for web reconnaissance with a look and feel similar to the Metasploit Framework, reducing the learning curve. It includes 76 recon modules, 8 reporting modules, 2 import modules, 2 exploitation modules, and 2 discovery modules as shown in version 4.9.4. Designed exclusively for web-based open source reconnaissance, it is not intended for exploitation or social engineering, recommending Metasploit and Social Engineer Toolkit for those purposes.

The framework supports interactive use and command-line operation via recon-cli, as well as a web-based UI through recon-web. Modules like recon/domains-vulnerabilities/xssed query external sources such as xssed.com to identify domain vulnerabilities including XSS and redirects, reporting details like host, category, example URLs, references, and status (e.g., unfixed).

Use cases include searching for known vulnerabilities on target domains, gathering reconnaissance data into workspaces, and generating reports. It integrates convenience functions, interactive help, command completion, and a marketplace (configurable).

How It Works

Recon-ng operates as a modular framework with a console interface where users load modules (e.g., recon/domains-vulnerabilities/xssed), set options like SOURCE (target domain), and run them. Modules interact with external sources like xssed.com to retrieve vulnerability data, storing results in a database for further use across recon, reporting, import, exploitation, and discovery modules. It supports workspace isolation, global and module-specific options, resource files for automation, and REST API via recon-web.

Installation

bash
sudo apt install recon-ng

Flags

-w workspaceload/create a workspace
-r filenameload commands from a resource file
--no-versiondisable version check
--no-analyticsdisable analytics
--no-marketplacedisable marketplace
--stealthenable stealth mode
--accessibleUse accessible outputs when available
-C commandruns a command at the global context (recon-cli)
-c commandruns a command at the module context (pre-run) (recon-cli)
-Gshow available global options (recon-cli)
-g name=valueset a global option (can be used more than once) (recon-cli)
-Mshow modules (recon-cli)
-m modulespecify the module (recon-cli)
--host HOSTIP address to listen on (recon-web)
--port PORTport to bind the web server to (recon-web)

Examples

Launch the main Recon-ng console interface
recon-ng
Load the xssed module for searching XSS vulnerabilities on xssed.com
use recon/domains-vulnerabilities/xssed
Set the target domain source for the module
set SOURCE cisco.com
Execute the loaded module to retrieve vulnerability data for the target
run
Show help for recon-ng with available options
recon-ng -h
Show help for recon-cli command-line interface
recon-cli -h
Show help for recon-web web-based UI
recon-web -h
Start the web-based user interface and API server
recon-web
Updated 2026-04-16kali.org ↗