LIVE NEWSROOM · --:-- · May 15, 2026
A LIBRARY FOR SECURITY RESEARCHERS

How to Recon-ng for gathering personal information

Post on X LinkedIn
How to Recon-ng for gathering personal information

This is part 2 in the recon-ng articles, in part 1 we discussed how to use the recon-ng framework for information gathering about someone’s networks and now in this part, we will gather the personal information of any person.

If you didn’t cover part 1 then [click here]

This part will help you gather someone’s personal information using the recon-ng framework.

Let’s start with the tool

// 01 Recon-ng for collecting personal information

1. Open your Linux terminal and type the command [recon-ng] for running the tool

2. create a new workspace for personal information gathering named (personal), enter the command [workspaces create person] for creating the workspace.

creating workspaces in recon-ng

3. Now first we need to perform footprinting on any domain to extract contacts available in it. For this first set the domain by the command:-

[db insert domains] ->
domain [cipherssecurity.com] ->
notes [any alias] ->
load recon modules[modules load brute] ->
then choose the module you want -> (recon/domains-hosts/brute_hosts)
[modules load recon/domains-hosts/brute_hosts] ->
[run]

footprinting with recon-ng
footprinting host found in recon-ng

4. Our first step is completed for footprinting the domain now we need to extract POC data that contains the username and other details.

5. Now load the whois_pocs module for gathering POC data from whois queries from the given domain.
[back] ->
[modules load recon/domains-contacts/whois_pocs] ->
after loading module enter the command [info] for viewing all the options required to execute the module ->
now set the source option [options set SOURCE twitter.com] ->
[run]

domains contact from whois

6. Now we will use another module for searching for any person from the domain list.

7. this module will help you in finding the existence of user-profiles on various domains and websites. enter these commands for executing this module:-
[back] ->
for finding profiles on various websites we need to load the profiler module ->
[modules load recon/profiles-profiles/profiler] ->
after loading the module enter the command [info] for seeing the options for running the module ->
[options set SOURCE anukram] ->
[run]

profiler module in recon-ng

8. As we gathered user details about the users in the various domains and websites. Now we need to create a report on it. We need to prepare the report containing the result of the profile URL of the obtained user.

9. for creating the report we need to load the HTML reporting module:-
[back] ->
[modules load reporting/html] ->
after loading the modules enter [info] command, and we need to assign some values in it such as FILENAME, CREATOR, AND CUSTOMER ->
[options set CREATOR lucifer] It will show the name of who created the report ->
[options set CUSTOMER anukram] It will show for whom we created the report ->
[options set FILENAME (destination for saving the file)] It will assign a place or directory for saving the generated report. ->
[run]

reporting in recon-ng

10. now we need to navigate to the directory where we saved the generated report and open it in the browser and observe the report.

report result in recon-ng

This is the final report of gathering information about any user from various websites and domains. The modules used in this phase will provide you with the exact URL of the user’s profiles on various websites.

This data will help you in doing social engineering attacks and finding vulnerabilities in employees’ data in any organization.

    TE
    Team Ciphers Security

    The Ciphers Security editorial team — practitioners covering daily threat intel, CVE deep-dives, and hands-on cybersecurity research. About us →

    Previous How to use Recon-ng Framework for information gathering Next How to use OSRFramework for performing Footprinting

    Latest News

    YARA-X 1.16.0: Faster Scans, Panic Fixes, and Neovim LSP Support YARA-X 1.16.0 ships with performance improvements across 10 PRs, constant folding for bitwise ops, configurable mat… Instructure Removed from ShinyHunters' Leak Site as Canvas Breach Deadline Passes Instructure was quietly removed from ShinyHunters' extortion site after the May 12, 2026 deadline — no data dump, n… Costa Rica Joins Have I Been Pwned as the 42nd Government Costa Rica's CSIRT gains free access to Have I Been Pwned's government domain monitoring service, becoming the 42nd… LummaC2 Infostealer Targets US Critical Infrastructure: CISA-FBI Advisory AA25-141B and DOJ Domain Seizures CISA and FBI advisory AA25-141B details LummaC2 MaaS infostealer TTPs targeting critical infrastructure. DOJ seized… MacSync Stealer: Hackers Abuse Google Ads and Claude.ai Chats to Push Mac Malware Russian-speaking attackers combine Google Ads and Claude.ai shared chats in a ClickFix campaign deploying MacSync S… JDownloader Site Hacked, Installers Swapped with Python RAT Malware JDownloader's website was hacked May 6–7, 2026, replacing Windows and Linux installers with a Python-based RAT. Use… Operation HookedWing: 4-Year Phishing Campaign Hits 500+ Organizations Across Aviation, Energy, and Logistics Operation HookedWing has stolen credentials from 500+ organizations in aviation, energy, logistics, and critical in… Twelve Critical vm2 Node.js Vulnerabilities Enable Sandbox Escape and Arbitrary Code Execution A dozen CVEs in the vm2 Node.js sandbox library — including CVSS 10.0 flaws — allow sandbox escape and RCE. Update …
    Scroll to Top