Back to all activities

Automated Reconnaisance

Summary

Considerations

    Walk Through

      Footnotes

      • 1 [Accumulating information about partners, clients, and competitors - The Penetration Testing Execution Standard](http://www.pentest-standard.org/index.php/Intelligence_Gathering#Logical)
      • 2 [The flow of information through the Recon-ng framework. (See: "Data Flow" section)](http://www.lanmaster53.com/2014/05/recon-ng-update)
      • 3 [Acquiring API Keys](https://bitbucket.org/LaNMaSteR53/recon-ng/wiki/Usage%20Guide#!acquiring-api-keys) \[^security_in_a_box_physical]:[How to protect your information from physical threats - Security in-a-box](https://securityinabox.org/chapter-2)