0% found this document useful (0 votes)
114 views57 pages

Module 2

The document outlines the processes of footprinting and reconnaissance in cybersecurity, emphasizing the importance of gathering information about target systems to identify vulnerabilities. It details various lab exercises using tools like Google dorks, Shodan, TheHarvester, and WHOIS for collecting data on domains, subdomains, and online presence. Additionally, it includes instructions for using specific tools and techniques to perform footprinting effectively while adhering to lab guidelines.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
114 views57 pages

Module 2

The document outlines the processes of footprinting and reconnaissance in cybersecurity, emphasizing the importance of gathering information about target systems to identify vulnerabilities. It details various lab exercises using tools like Google dorks, Shodan, TheHarvester, and WHOIS for collecting data on domains, subdomains, and online presence. Additionally, it includes instructions for using specific tools and techniques to perform footprinting effectively while adhering to lab guidelines.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 57

MODULE -2

Footprinting
&
Reconnaissance

NOTE: Shutting down the labs , restart , making modifications to


the software, or performing any updates is strictly prohibited.
Doing so will result in the termination of your lab access.
Footprinting and reconnaissance
Footprinting and reconnaissance are initial phases in the process of information
gathering and intelligence gathering in cybersecurity and ethical hacking:

Lab objectives:
• Footprinting involves collecting information about a target system or
organization to understand its network architecture, infrastructure, and
potential vulnerabilities.
• It includes passive data collection methods like searching public
information, social media, WHOIS databases, and other publicly available
resources to gather details about the target.
• The aim is to gather as much information as possible without directly
interacting with the target, helping hackers identify potential entry points
and weaknesses in the system's security.

• Reconnaissance, also known as "scanning," is an active information-


gathering phase.
• It involves probing the target system or network using tools and
techniques to collect specific information like IP addresses, open ports,
services running on those ports, and potential vulnerabilities.
• Reconnaissance may include techniques like port scanning, network
mapping, and vulnerability scanning to gain deeper insights into the
target's security posture.
• The data obtained during reconnaissance helps in developing a more
targeted and informed approach for subsequent stages of ethical hacking
or penetration testing.
Step 1. Start labs by clicking [ START LABS ] button

Users will be redirected to labs environment


Right Click on windows 10 machine & click on open in new tab

In a new tab, users can access the Windows 10 environment directly


. Navigate to the File Explorer, and within the Documents folder, locate the
"Tools" directory. This folder contains various tools relevant to the modules for
user convenience and easy access
LAB -1
Performing FootPrinting Through Search Engines
Performing footprinting using Google dorks involves using specific search
queries or operators within Google's search engine to find sensitive
information or vulnerabilities on the internet.
1. Turn on windows 10 , open any browser or you can open any browser in
your windows machine
2. Type google.com
3. Type intitle:password site:google.com

The Google dork "intitle:password site:google.com" is a search


query designed to find web pages on the Google website
containing the term "password" in their title, potentially indicating
pages that have the word "password" in their title tags.
4. Type site:google.com filetype:pdf

The search query "site:google.com filetype:pdf" in Google is


used to find PDF files specifically within the Google.com domain.
This query restricts the search results to PDF documents hosted on
the Google.com website.
5. When you open any link, it will display a PDF form related to the
search query.

7. Similarly, we have various Google dorks such as "allinurl," "intitle,"


and more, each serving different search functions and refining
search results based on specific URL or page title parameters.

allinurl:
• This operator searches for URLs containing all specified terms.
• Example: allinurl: cybersecurity training will find URLs that contain both
"cybersecurity" and "training" in their addresses.

intitle:
• Searches for pages with specific words in their title.
• Example: intitle:login google will show pages that have "login" and "google"
in their titles.

intext:
• Helps find pages with specific words in their text.
• Example: intext:Python programming will display pages containing the phrase
"Python programming" in their content

inurl:
• Finds URLs containing a specific word or phrase.
• Example: inurl:login page will display URLs that contain "login" in their
address.

TASK-2 Gathering information through IOT search engines.

IoT (Internet of Things) search engines are specialized tools used to


discover and gather information about connected devices, their
configurations, and publicly available IoT-related data.

Step1. open shodan.io website


• Shodan is a popular search engine for IoT devices. It allows users to search for
specific devices, services, or protocols across the internet.
• Users can search for specific IoT devices using keywords or filters. For
example, searching for "webcam" or "printer" might reveal publicly accessible
devices.
Step 2. search for amazon or any set of servce or port
number ftp or 21 as shown in image.
The search query you're referring to likely provides information
about publicly available services that might have vulnerabilities.
This might include details about these devices, such as IP
addresses, locations, configurations, and possibly whether they
have known vulnerabilities. Since vsftpd is a popular FTP server
software, finding instances of it through Shodan could help identify
potential targets or systems for further analysis regarding their
security status. However, note that finding vsftpd instances doesn't
necessarily imply they're all vulnerable; it depends on various
factors, including specific configurations and patch levels.

LAB -2
Performing FootPrinting Through Web Services
Footprinting through web services involves collecting data on a target's
online presence and systems by using search engines, specialized tools,
and website analysis to gather information on infrastructure,
technologies, and potential vulnerabilities. This process aims to map and
understand the digital footprint of an organization or service.

Finding company’s domains and subdomains by using


netcraft tool

Step1. Visit https://netcraft.com

Step 2. Click on Resources and press research tools as shown in the


image.
Step 3. Click on site report as shown in the image.
Step 4. now search for any domain you would like to search for and click
on lookup button

The site report for microsoft.com would display network information,


background details, and other relevant information.
Step 5. Click on Microsoft.com in the network field ,domain
Microsoft.com , this will show up the subdomains of the domain
Microsoft.com

This result will display subdomains of Microsoft along with some info.
Task 2- Gather emails through theharvester tool

TheHarvester is an open-source tool utilized for cybersecurity


reconnaissance, collecting email addresses, subdomains, and related
data from public sources. It aids in understanding a target's online
presence and potential security vulnerabilities.

Step 1 . login to linux

Step 2. we are going to clone the theHarvester tool into parrot os .


git clone https://github.com/laramies/theHarvester.git
Step 3. Clone the tool

Step4 . now navigate into the theHarvester folder by changing the directory
cd theHarvester
now run
pip3 install -r requirements.txt
Step 5. now run python3 theHarvester.py

Step6 . now we will find subdomains by using theHarvester tool.

python3 theHarvester.py -d Microsoft.com -l 200 -b bing

TheHarvester -d microsoft.com -l 200 -b google: This command searches for


subdomains of "microsoft.com" using Google as the search engine, retrieving a
maximum of 200 results.
Here is the search results from theHarvester tool display the discovered
subdomains linked to microsoft.com.

Task 3- find out the target operating system using


censys

1.Censys is a search engine that specializes in internet-wide scanning


and indexing of various devices, networks, and systems. It helps users
discover and analyze connected devices, internet-facing servers, and
their configurations

Step 1. Visit censys.com


Step2. click on censys search
2.As you can see, the search results display basic information about the
operating system, details related to Microsoft, and other network-related
information of the target
LAB -3
Performing FootPrinting Through social networking
sites

Footprinting" through social networking sites refers to the process of


gathering information about someone using their online presence,
particularly on social media platforms. This information can include
personal details, interests, connections, activities, and more.

Step 1. Clone the sherlock tool into parrot os

https://github.com/sherlock-project/sherlock.git

Step 2. Now navigate into the sherlock folder and install the
requirements

cd sherlock
Pip3 install -r requirements.txt
Step 3. Now navigate into another sherlock folder inside of the tool

cd sherlock

Step 4. Now run the tool using python

Python3 sherlock.py satyanadella

Assuming you have the Sherlock tool installed and you want to search
for the username "satyanadella"
LAB -3
Performing WebSite FootPrinting
Website footprinting involves gathering information about a site's
ownership, infrastructure, and technology stack, often using WHOIS,
DNS enumeration, and web server identification tools to understand its
structure and potential vulnerabilities.

Gather information about the target using ping tool

Step 1 . log into the windows 10 machine

Step 2. Open cmd

Step 3. type ping google.com


ping google.com

Note the target ip address and also the you can see the ping statstics of
the target.

Task-2 Gather information about the target using


website informer
Step 1. Visit website.informer.com

Step 2. Search for google.com


a search result for google.com contains info, whoi’s data statistics , and
other network information

Task-3 Gather information about the target using


web data extractor.

Step 1. Open windows 10

Step 2. Click on file explorer and navigate to documents


Step 3. Click on tools and navigate to module2 tools > web spiders >
web data extractor

Step 4. Now install the tool


Step 5 . double click the file the main screen appears

Step 6 . click on new to start a new session.


Give google.com in the url field.

And tick the settings as shown in the image .


Step 7 . now click on start

Task-4: clone a target website using httrack website


copier tool.

Step 1. In the windows 10 lab machine , navigate to documents, tools,


module 2 , website mirroring tools ,httrack.

Step 2. double click the file and install it


Step 3. The httrack website copier tool wizard opens
Step 4. Click on next

Step 5. Give any name to the project and click next

Step 6. Give any url , and click on set options.


Step 7. click on scan rules and tick the three boxes and click ok

Step 8. Click next


Step 9. Check disconnect when finished, click on finish

Step 10 . site cloning progress will be started.

Step 11. Upon completion , it will display browse mirrored website , click on it.
Step 12. It will open the mirrored website in firefox

Step 13. Analyze all directories, html , images and site structure and other files.

Step 14 . once done click on finish and exit


LAB -4
Performing whois FootPrinting

WHOIS footprinting" refers to the practice of gathering information


about domain registrations using WHOIS databases. This involves
retrieving details such as the domain owner's name, contact information,
registration and expiration dates, domain registrar, and sometimes
technical information related to the domain.

Task-1: perform whois lookup using whoisdomain


tools.

Step1. visit https://whois.domaintools.com/


Step 2. Enter any url of a website

Step 3. This search results displays, organization details such as network


information , register date , domain owner , ip address , location etc
LAB -5
Performing dns FootPrinting
DNS footprinting involves the process of gathering information about a
domain's DNS (Domain Name System) infrastructure. This includes
obtaining details such as IP addresses associated with the domain, mail
servers, name servers, and other DNS records related to the domain.

Task-1: gather dns information using nslookup


command line tool

Step 1. Open command promt in windows lab machine


Step 2. Type nslookup and press enter.

Step 3. Now type


set type=a
testphp.vulnweb.com
thus, it displays the ip address of the target website

step 4. Now type

set type=cname
testphp.vulnweb.com

this returns the server name server along with mail server address
as shown in the image .
Task-2: perform reverse dns lookup using dnsrecon
and reverse ip domain check.

Step 1. Visit https://yougetsignal.com/


And click on reverse ip domain check
step 2. Now enter any url and click on check .

The result indicates that these listed subdomains are hosted on the
identical server as testphp.vulnweb.com.
Task-3: perform reverse dns lookup using dnsrecon
Step 1. open parrot os lab machine.

Step 2. Step 2 type dnsrecon and press enter.


Step 3. If you see anything command not found type,

sudo apt-get install dnsrecon

step 4. dnsrecon -d bing.com

-d stands for domain.

This display the results of the target name server, mail server , text
records , ip address .

this concludes the demonstration of gathering information about the


target by performing reverse dns lookup , youget signal , dnsrecon tool
Task-4: perform network footprinting using tracert,
traceroute.

Step 1. Open command promt in windows 10 lab machine

Step 2. Type
tracert google.com
This displays the hops and packets made before reaching the destination .

Step 3. Open parrot os lab machine. To do a traceroute to google.com


traceroute google.com

This concludes the demonstration of a network trace routing using windows


and linux platforms.

Task-4: perform footprinting using various


footprinting tools.
. BillCipher
.OSINT Framework
Step 1. Log into parrot os lab machine
Step 2. Clone the billcipher tool into parrot os
git clone https://github.com/bahatiphill/BillCipher.git
cd BillCipher
pip3 install -r requirements.txt
python3 billcipher.py
After installation run
Step 3 .python3 billcipher.py
Step 4. As you can see in the image it is promting for website/ip
Type website and press enter , now enter any website url and press enter.

Step5. Now choose any on option what information do you want to collect ?
Step 6 . for example here I m choosing 1

This will display the results of text records , a records and other information
about the target

Step 7 . now it will promt for do you want to continue


Type yes and press enter
Step 8 . it will promt you for enter websie /ip , type website and hit ener.

Step 9 . now you can choose any website type the website name and hit enter.

Now the process repeats , explore various techniques and options in this tool
by following the same process as we seen in the previous steps .
Task-5: perform footprinting using osintframework
tool.
Step 1. Visit https://osintframework.com

Step 2. Click on any of those given options you would like to use

Example : if you choose domain name it will display the subresources of


that option .
Step 3 . now you can choose what information would you like to collect
for example if you want to collect subdomains of a target website click
on subdomains
Step 4. This is will display different tools that will be used to fetch the
subdomains of a target you can choose any one or you can try all for
better results.

Step 5. Lets assume if you want to choose pentester-tools.com


submdomains as shown in the above image . and click on it.
it will redirect you to external website .enter a url and press start scan.
Step 6 . it will take few min to find the subdomains of the target website.

Step 7 . now scroll down to see the list of subdomains of the target
website.
NOTE: After using the labs, log out or close them.

Step 1. Click on windows

Step 2. Click on power and press disconnect as


shown in the below image.
Step 3. Now click on home or logout .
FOR - LINUX:

Step 1. Click on menu as shown in the image.


Step 2. Click on exit the current session.
Step 3. Click on logout.

Step 4. You can click home or logout.

NOTE: Shutting down the labs, making modifications to the


software, or performing any updates is strictly prohibited. Doing so
will result in the termination of your lab access.

You might also like