O'Reilly logo

Kali Linux Intrusion and Exploitation Cookbook by Ishan Girdhar, Dhruv Shah

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Setting up API keys for recon-ng

In this recipe, we will see how we need to set up API keys before starting to use recon-ng. Recon-ng is one of the most powerful information gathering tools; if used properly, it can help pentesters gather a fairly good amount of information from public sources. With the latest version available, recon-ng provides the flexibility to set it up as your own app/clients in various social networking websites.

Getting ready

For this recipe, you will require an Internet connection and a web browser.

How to do it...

  1. To set up recon-ng API Keys, open the terminal, launch recon-ng, and type the commands shown in the following screenshot:

  2. Next, type keys list, as shown in the following screenshot:

  3. Let's start by adding twitter_api ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required