Reconnaissance in Cybersecurity: Complete Beginner’s Guide with Nmap and Recon-ng

Learn the fundamentals of reconnaissance in cybersecurity, the first step of ethical hacking. This beginner-friendly guide covers passive and active techniques along with real tools like Nmap and Recon-ng. Perfect for anyone starting their journey in information gathering and ethical hacking

πŸ“Œ What is Reconnaissance ?

Reconnaissance (Recon) is the first phase of ethical hacking where you collect information about a target system, network, or organization.

πŸ‘‰ In simple words:

β€œIt’s like researching your target before taking any action.”

🎯 Goal of Recon:

  • Identify IP addresses
  • Discover domains & subdomains
  • Find open ports & services
  • Gather employee or organizational data 



🧠 Types of Reconnaissance :

πŸ”Ž 1. Passive Reconnaissance

βœ”οΈ No direct interaction with the target

βœ”οΈ Safe and legal (if done ethically)

πŸ“Œ Techniques:

  • Google Dorking
  • WHOIS Lookup
  • Social Media Analysis
  • OSINT (Open Source Intelligence)

πŸ“‘ 2. Active Reconnaissance

⚠️ Direct interaction with the target

⚠️ Can be detected by security system

πŸ“Œ Techniques:

  • Port Scanning
  • Network Scanning
  • Vulnerability Scanning


Top Reconnaissance Techniques (With Examples) :

πŸ”Ž 1. Google Dorking :

Use advanced Google queries to find hidden data.

βœ… Example:

site:example.com filetype:pdf

πŸ‘‰ Finds all PDF files on a website.


🌐 2. WHOIS Lookup :

Find domain ownership and registration details.

βœ… Command (Linux/Kali):

whois example.com

πŸ‘‰ Output may include:

  • Owner name
  • Email
  • Registrar details

πŸ“‘ 3. Network Scanning with Nmap :

Nmap is one of the most powerful tools for active reconnaissance.

βœ… Basic Scan (Linux/Kali):

nmap 192.168.1.1

πŸ‘‰ Scans common ports on the target.

βœ… Scan All Ports:

nmap -p- 192.168.1.1

πŸ‘‰ Checks all 65535 ports.

βœ… Service Version Detection:

nmap -sV 192.168.1.1

πŸ‘‰ Detects services like HTTP, SSH, FTP.

βœ… OS Detection:

nmap -O 192.168.1.1

πŸ‘‰ Tries to identify the operating system.

πŸ•΅οΈβ€β™‚οΈ 4. OSINT using Recon-ng :

Recon-ng is a powerful framework for gathering open-source intelligence.

βœ… Start Recon-ng (Linux/Kali):

recon-ng

βœ… Create Workspace:

workspaces create myproject

βœ… Load Module:

modules load recon/domains-hosts/bing_domain_web

βœ… Add Target Domain:

options set SOURCE example.com

βœ… Run Module:

run

πŸ‘‰ This will collect subdomains and related information.