<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>recon-ng Archives - Vertex Cyber Security</title>
	<atom:link href="https://www.vertexcybersecurity.com.au/tag/recon-ng/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.vertexcybersecurity.com.au/tag/recon-ng/</link>
	<description>Your Partner in Cyber Security</description>
	<lastBuildDate>Fri, 21 Apr 2023 01:47:52 +0000</lastBuildDate>
	<language>en-AU</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.vertexcybersecurity.com.au/wp-content/uploads/2024/08/cropped-ColoredLogo-32x32.png</url>
	<title>recon-ng Archives - Vertex Cyber Security</title>
	<link>https://www.vertexcybersecurity.com.au/tag/recon-ng/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Reconnaissance In Penetration Testing &#8211; Everything You Need To Know</title>
		<link>https://www.vertexcybersecurity.com.au/reconnaissance-in-penetration-testing-everything-you-need-to-know/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=reconnaissance-in-penetration-testing-everything-you-need-to-know</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Fri, 31 Mar 2023 02:59:27 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[active reconnaissance]]></category>
		<category><![CDATA[Business cybersecurity]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Maltego]]></category>
		<category><![CDATA[Metasploit]]></category>
		<category><![CDATA[Nmap]]></category>
		<category><![CDATA[Passive Reconnaissance]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[recon-ng]]></category>
		<category><![CDATA[reconnaissance]]></category>
		<category><![CDATA[Shodan]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=5630</guid>

					<description><![CDATA[Reconnaissance is the first phase of a penetration testing engagement. It involves gathering information about the target system or network that is going to be tested. The goal of reconnaissance is to gather as much information as possible about the target so that the penetration tester can understand the target system&#8217;s architecture, identify potential vulnerabilities, [&#8230;]]]></description>
		
		
		
			</item>
	</channel>
</rss>
