Skip to main contentSkip to main content
Room Banner
Back to all walkthroughs
Room Icon

Red Team Recon

Premium room

Learn how to use DNS, advanced searching, Recon-ng, and Maltego to collect information about your target.

easy

120 min

96,604

User profile photo.
User profile photo.

To access material, start machines and answer questions login.

“Know your enemy, know his sword.” wrote Miyamoto Musashi in his book, A Book of Five Rings: The Classic Guide to Strategy. He also wrote, “You win battles by knowing the enemy’s timing, and using a timing which the enemy does not expect.” Although this was written when swords and spears won battles, it also applies to cyberspace, where attacks are launched via keyboards and crafted packets. The more you know about your target’s infrastructure and personnel, the better you can orchestrate your attacks.

In a red team operation, you might start with no more than a company name, from which you need to start gathering information about the target. This is where reconnaissance comes into play. Reconnaissance (recon) can be defined as a preliminary survey or observation of your target (client) without alerting them to your activities. If your recon activities create too much noise, the other party would be alerted, which might decrease the likelihood of your success.

The tasks of this room cover the following topics:

  • Types of reconnaissance activities
  • WHOIS and -based reconnaissance
  • Advanced searching
  • Searching by image
  • Google Hacking
  • Specialized search engines
  • Recon-ng
  • Maltego


Some specific objectives we'll cover include:

  • Discovering subdomains related to our target company
  • Gathering publicly available information about a host and IP addresses
  • Finding email addresses related to the target
  • Discovering login credentials and leaked passwords
  • Locating leaked documents and spreadsheets

Reconnaissance can be broken down into two parts — passive reconnaissance and active reconnaissance, as explained in Task 2. In this room, we will be focusing on passive reconnaissance, i.e., techniques that don’t alert the target or create 'noise'. In later rooms, we will use active reconnaissance tools that tend to be noisy by nature.

Answer the questions below
We suggest you start the AttackBox and experiment with every command and tool we demonstrate.

Ready to learn Cyber Security?

The Red Team Recon room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.

Already have an account? Log in

We use cookies to ensure you get the best user experience. For more information see our cookie policy.