OSINT Using Recon-ng


This is not "just another tools" course!


This course starts by teaching students how to install and configure Recon-ng, even the pesky API keys. From here, we springboard into Advanced Query Techniques followed by Joe's favorite modules. The course is completed through working through the Import and Reporting modules followed by Recon-cli and Recon-web.


OSINT Using Recon-ng Curriculum


  Preamble
Available in days
days after you enroll
  Installing Recon-ng
Available in days
days after you enroll
  Configuring Recon-ng
Available in days
days after you enroll
  Using Recon-ng Part 1
Available in days
days after you enroll
  Using Recon-ng Part 2
Available in days
days after you enroll
  Using Recon-ng Part 3
Available in days
days after you enroll
  Import and Reporting Modules
Available in days
days after you enroll
  Using Other Recon-ng packages
Available in days
days after you enroll
  Conclusion
Available in days
days after you enroll

Choose a Pricing Option

About the Instructor

Joe Gray, a veteran of the U.S. Navy Submarine Force, is the inaugural winner of the DerbyCon Social Engineering Capture the Flag (SECTF) and was awarded a DerbyCon Black Badge. Joe is the Founder and Principal Instructor at The OSINTion.

As a member of the Password Inspection Agency, Joe has consistently performed well in Capture the Flag events, specifically those involving OSINT. Examples include 2nd Place in the HackFest Quebec Missing Persons CTF and Winning the TraceLabs OSINT Search Party during DEFCON 28 (as a member of The Password Inspection Agency), DEFCON 29 (as a member of The Federal Bureau of OH-SHINT), and DEFCON 30 (as a member of The Eff Ess Bees). Independently, Joe placed 4th in the DerbyCon OSINT CTF and 3rd in the National Child Protection Task Force Missing Persons CTF and 2nd Place in Hacker Jeopardy at Hack in Paris.

Joe has contributed material for a variety of platforms such as Forbes and Dark Reading in addition to his platforms. Joe has authored the OSINT tools DECEPTICON Bot and WikiLeaker in addition to the book, Practical Social Engineering, available via NoStarch Press.