2. Perform Foot Printing and Reconnaissance
In this practical, we will perform foot printing and reconnaissance using various tools and techniques.
Step 1: Using Search Engines (Google Dorks)
- Open your web browser and go to Google.
- In the search bar, type in a Google Dork query. For example, "site:example.com filetype:pdf" to find PDF files on a specific website.
- Analyze the search results for any useful information.
Step 2: Using Web Services and Social Networking Sites, Email Footprinting
- Use tools like Netcraft and theHarvester to gather information about a target from web services and social networking sites.
- Use the TOR Browser to anonymize your activities.
- Use sherlock to find usernames across social networks.
Step 3: Website Footprinting
- Use the ping command to determine the IP address of a target website.
- Use Web Site Copier to download a website for offline analysis.
- Use CeWL to generate a wordlist based on a website's content.
Step 4: Whois/DNS Footprinting
- Use the nslookup command to find DNS records for a target domain.
- Use DNSRecon for advanced DNS enumeration.
By following these steps, we can gather a significant amount of information about our target, which can be useful in later stages of an ethical hacking operation.