Module 2
Module 2
Module 2
Lab 1: Perform Footprinting Through Search
Engines
Lab Scenario
As a professional ethical hacker or pen tester, your first step is to gather maximum information
about the target organization by performing footprinting using search engines; you can perform
advanced image searches, reverse image searches, advanced video searches, etc. Through the
effective use of search engines, you can extract critical information about a target organization
such as technology platforms, employee details, login pages, intranet portals, contact details, etc.,
which will help you in performing social engineering and other types of advanced system
attacks.
Lab Objectives
Search engines use crawlers, automated software that continuously scans active websites, and
add the retrieved results to the search engine index, which is further stored in a huge database.
When a user queries a search engine index, it returns a list of Search Engine Results Pages
(SERPs). These results include web pages, videos, images, and many different file types ranked
and displayed based on their relevance. Examples of major search engines include Google, Bing,
Yahoo, Ask, Aol, Baidu, WolframAlpha, and DuckDuckGo.
Here, we will consider EC-Council as a target organization. However, you can select a target
organization of your choice.
1. By default, Windows 11 machine selected, click Ctrl+Alt+Delete and login
   with Admin/Pa$$w0rd.
   Here, this Advanced Google Search operator can help attackers and pen testers to
   extract login pages of the target organization's website. Attackers can subject
   login pages to various attacks such as credential bruteforcing, injection attacks
   and other web application attacks. Similarly, assessing the login pages against
   various attacks is crucial for penetration testing.
4. Similarly, type the command EC-Council filetype:pdf ceh in the search bar to
   search your results based on the file extension and the keyword (here, ceh). Click
   on any link from the results (here, CEH-brochure.pdf) to view the pdf file.
   Here, the file type pdf is searched for the target organization EC-Council. The
   result might differ when you perform this task.
   The PDF and other documents from a target website may provide sensitive
   information about the target's products and services. They may help attackers to
   determine an attack vector to exploit the target.
5. The page appears displaying the PDF file, as shown in the screenshot.
6. Apart from the aforementioned advanced Google operators, you can also use the
   following to perform an advanced search to gather more information about the
   target organization from publicly available sources.
         o   cache: This operator allows you to view cached version of the web
             page. [cache:www.eccouncil.org]- Query returns the cached version
             of the website www.eccouncil.org
         o   inurl: This operator restricts the results to pages containing the word
             specified in the URL [inurl: copy site:www.eccouncil.org]-Query
             returns only pages in EC-Council site in which the URL has the
             word "copy"
         o   allintitle: This operator restricts results to pages containing all the
             query terms specified in the title. [allintitle: detect malware]-Query
             returns only pages containing the words "detect" and "malware" in
             the title
         o   info: This operator finds information for the specified web page.
             [info:eccouncil.org]-Query provides information about the
             www.eccouncil.org home page
8. Close all open windows and document all the acquired information.
Lab 2: Perform Footprinting Through Internet
Research Services
Lab Scenario
As a professional ethical hacker or pen tester, you should be able to extract a variety of
information about your target organization from Internet research services. By doing so, you can
extract critical information such as a target organization's domains, subdomains, operating
systems, geographic locations, employee details, emails, financial information, infrastructure
details, hidden web pages and content, etc.
Using this information, you can build a hacking strategy to break into the target organization's
network and can carry out other types of advanced system attacks.
Lab Objectives
 Find the company's domains and subdomains using Netcraft and DNSdumpster
Internet research services such as people search services, alerting services, financial services, and
job sites, provide information about a target organization; for example, infrastructure details,
physical location, employee details, etc. Moreover, groups, forums, and blogs may provide
sensitive information about a target organization such as public network information, system
information, and personal information. Internet archives may provide sensitive information that
has been removed from the World Wide Web (WWW).
Here, we will extract the company's domains and subdomains using the Netcraft and
DNSdumpster tools.
3. Click on menu icon from the top-right corner of the page and navigate to
   the Resources -> Research Tools.
4. In the Tools | Netcraft page, click on Site Report option.
         18. You can also use tools such as Pentest-Tools Find Subdomains (https://pentest-
             tools.com), to identify the domains and subdomains of any target website.
19. Close all open windows and document all the acquired information.
Question 2.2.1.1
As a professional ethical hacker, during information gathering, you need to gather personal
information about employees working in critical positions in the target organization; for example, the
Chief Information Security Officer, Security Architect, or Network Administrator. By footprinting
through social networking sites, you can extract personal information such as name, position,
organization name, current location, and educational qualifications. Further, you can find
professional information such as company or business, current location, phone number, email ID,
photos, videos, etc. The information gathered can be useful to perform social engineering and other
types of advanced attacks.
Lab Objectives
 Gather personal information from various social networking sites using Sherlock
Social networking sites are online services, platforms, or other sites that allow people to connect and
build interpersonal relations. People usually maintain profiles on social networking sites to provide
basic information about themselves and to help make and maintain connections with others; the
profile generally contains information such as name, contact information (cellphone number, email
address), friends' information, information about family members, their interests, activities, etc. On
social networking sites, people may also post their personal information such as date of birth,
educational information, employment background, spouse's names, etc. Organizations often post
information such as potential partners, websites, and upcoming news about the company. Thus,
social networking sites often prove to be valuable information resources. Examples of such sites
include LinkedIn, Facebook, Instagram, Twitter, Pinterest, YouTube, etc.
Here, we will use Sherlock to gather personal information about the target from the social networking
sites.
Here, we are gathering information about Elon Musk. However, you can select a target of your
choice.
         2. Click Parrot Security to switch to Parrot machine, and login with attacker/toor. Open
            a Terminal window and execute sudo su to run the programs as a root user (When
            prompted, enter the password toor).
         3. Run sherlock "Elon Musk" command and you will get all the URLs related to Elon
            Musk, as shown in the screenshot. Scroll-down to view all the results.
             The results might differ when you perform this task. If you receive any error
             messages in between ignore them.
         4. The attackers can further use the gathered URLs to obtain sensitive information
            about the target such as DOB, employment status and information about the
              organization that they are working for, including the business strategy, potential
              clients, and upcoming project plans.
7. Close all open windows and document all the acquired information.
Question 2.3.1.1
Use the Sherlock tool to gather all the URLs related to Elon Musk from various social networking
sites. Enter the complete URL related to Elon Musk that is obtained from the social networking site
Codewars.
During the footprinting process, gathering information on the target IP address and domain obtained
during previous information gathering steps is important. As a professional ethical hacker or
penetration tester, you should be able to perform Whois footprinting on the target; this method
provides target domain information such as the owner, its registrar, registration details, name server,
contact information, etc. Using this information, you can create a map of the organization's network,
perform social engineering attacks, and obtain internal details of the network.
Lab Objectives
This lab focuses on how to perform a Whois lookup and analyze the results. Whois is a query and
response protocol used for querying databases that store the registered users or assignees of an
Internet resource such as a domain name, an IP address block, or an autonomous system. This
protocol listens to requests on port 43 (TCP). Regional Internet Registries (RIRs) maintain Whois
databases, and contains the personal information of domain owners. For each resource, the Whois
database provides text records with information about the resource itself and relevant information of
assignees, registrants, and administrative information (creation and expiration dates).
          1. Click Windows 11 to switch to the Windows 11 machine, open any web browser,
             and go to https://whois.domaintools.com (here, we are using Mozilla Firefox).
          2. The Whois Lookup website appears, as shown in the screenshot. Now, in the
             search bar, search for www.certifiedhacker.com.
          3. This search result reveals the details associated with the URL
             entered, www.certifiedhacker.com, which includes organizational details such as
             registration details, name servers, IP address, location, etc., as shown in the
             screenshots.
         4. This concludes the demonstration of gathering information about a target
            organization by performing the Whois lookup using DomainTools.
         5. Using this information, an attacker can create a map of the organization's network
            and further mislead domain owners with social engineering, and obtain internal
            details of the network.
7. Close all open windows and document all the acquired information.
Question 2.4.1.1
Perform a Whois lookup using DomainTools and find the URL that belongs to the registrar of the
website www.certifiedhacker.com.
Lab 5: Perform DNS Footprinting
Lab Scenario
As a professional ethical hacker, you need to gather the DNS information of a target domain
obtained during the previous steps. You need to perform DNS footprinting to gather information
about DNS servers, DNS records, and types of servers used by the target organization. DNS zone
data include DNS domain names, computer names, IP addresses, domain mail servers, service
records, and much more about a target network.
Using this information, you can determine key hosts connected in the network and perform
social engineering attacks to gather even more information.
Lab Objectives
 Gather DNS information using nslookup command line utility and online tool
Overview of DNS
DNS considered the intermediary source for any Internet communication. The primary function
of DNS is to translate a domain name to IP address and vice-versa to enable human-machine-
network-internet communications. Since each device has a unique IP address, it is hard for
human beings to memorize all IP addresses of the required application. DNS helps in converting
the IP address to a more easily understandable domain format, which eases the burden on human
beings.
Here, we will perform DNS information gathering about target organizations using the nslookup
command-line utility and NSLOOKUP web application.
         2. In the nslookup interactive mode, type set type=a and press Enter. Setting the
            type as "a" configures nslookup to query for the IP address of a given domain.
3. Type the target domain www.certifiedhacker.com and press Enter. This
   resolves the IP address and displays the result, as shown in the screenshot.
   This specifies that the result was directed to the default server hosted on the local
   machine (Windows 11) that resolves your requested domain.
5. Thus, if the response is coming from your local machine's server (Google), but
   not the server that legitimately hosts the domain www.certifiedhacker.com; it is
   considered to be a non-authoritative answer. Here, the IP address of the target
   domain www.certifiedhacker.com is 162.241.216.11.
6. Since the result returned is non-authoritative, you need to obtain the domain's
   authoritative name server.
7. Type set type=cname and press Enter. The CNAME lookup is done directly
   against the domain's authoritative name server and lists the CNAME records for
   a domain.
10. Since you have obtained the authoritative name server, you will need to
    determine the IP address of the name server.
12. Type ns1.bluehost.com (or the primary name server that is displayed in your lab
    environment) and press Enter. This returns the IP address of the server, as
    shown in the screenshot.
13. The authoritative name server stores the records associated with the domain. So,
    if an attacker can determine the authoritative name server (primary name server)
    and obtain its associated IP address, he/she might attempt to exploit the server to
    perform attacks such as DoS, DDoS, URL Redirection, etc.
14. You can also perform the same operations using the NSLOOKUP online tool.
    Conduct a series of queries and review the information to gain familiarity with
    the NSLOOKUP tool and gather information.
15. Now, we will use an online tool NSLOOKUP to gather DNS information about
    the target domain.
19. In the Query: field, click the drop-down arrow and check the different options
    that are available, as shown in the screenshot.
20. As you can see, there is an option for AAAA (IPv6 address); select that and
    click Look it up. Perform queries related to this, since there are attacks that are
    possible over IPv6 networks as well.
         21. This concludes the demonstration of DNS information gathering using the
             nslookup command-line utility and NSLOOKUP online tool.
23. Close all open windows and document all the acquired information.
Question 2.5.1.1
Use the nslookup command-line utility to find the primary name server of the website
www.certifiedhacker.com.
Lab 6: Perform Network Footprinting
Lab Scenario
With the IP address, hostname, and domain obtained in the previous information gathering steps,
as a professional ethical hacker, your next task is to perform network footprinting to gather the
network-related information of a target organization such as network range, traceroute, TTL
values, etc. This information will help you to create a map of the target network and perform a
man-in-the-middle attack.
Lab Objectives
Here, we will perform network tracerouting using both Windows and Linux machines.
Here, we will consider www.certifiedhacker.com as a target website. However, you can select a
target domain of your choice.
         1. In the Windows 11 machine, open the Command Prompt window. Run tracert
            www.certifiedhacker.com command to view the hops that the packets made
            before reaching the destination.
5. Now, click Parrot Security to switch to the Parrot Security machine and open
   a Terminal window.
   Since we have set up a simple network, you can find the direct hop from the
   source to the target destination. However, screenshots may vary depending on
   the target destination.
         7. This concludes the demonstration of performing network tracerouting using the
            Windows and Linux machines.
Question 2.6.1.1
Perform network tracerouting using traceroute command on the Parrot machine for the
www.certifiedhacker.com domain. Enter the IP address of the target domain.
Lab 7: Perform Email Footprinting
Lab Scenario
As a professional ethical hacker, you need to be able to track emails of individuals (employees) from
a target organization for gathering critical information that can help in building an effective hacking
strategy. Email tracking allows you to collect information such as IP addresses, mail servers, OS
details, geolocation, information about service providers involved in sending the mail etc. By using
this information, you can perform social engineering and other advanced attacks.
Lab Objectives
E-mail footprinting, or tracking, is a method to monitor or spy on email delivered to the intended
recipient. This kind of tracking is possible through digitally time-stamped records that reveal the time
and date when the target receives and opens a specific email.
Here, we will gather information by analyzing the email header using eMailTrackerPro.
1. Click Windows 11 to switch to the Windows 11 machine, navigate to E:\CEH-
   Tools\CEHv13 Module 02 Footprinting and Reconnaissance\Email Tracking
   Tools\eMailTrackerPro and double-click emt.exe.
3. The eMailTrackerPro Setup window appears. Follow the wizard steps (by selecting
   default options) to install eMailTrackerPro.
8. Click the Trace Headers icon from the New Email Trace section to start the trace.
9. A pop-up window will appear; select Trace an email I have received. Copy the
   email header from the suspicious email you wish to trace and paste it in the Email
   headers: field under Enter Details section.
10. For finding email headers, open any web browser and log in to any email account of
    your choice; from the email inbox, open the message you would like to view
    headers for.
          o   Open an email; click the dots (More) icon arrow next to the Reply icon
              at the top-right corner of the message pane.
          o   Select Show original from the list.
          o   The Original Message window appears in a new browser tab with all
              the details about the email, including the email header
In Outlook, find the email header by following the steps:
   Here, we are analyzing the email header from gmail account. However, you can
   also analyze the email header from outlook account.
12. The My Trace Reports window opens.
13. The email location will be traced in a Map (world map GUI). You can also view the
    summary by selecting Email Summary on the right-hand side of the window.
    The Table section right below the Map shows the entire hop in the route, with
    the IP and suspected locations for each hop.
14. To examine the Network Whois data, click the Network Whois button below Email
    Summary to view the Network Whois data.
         15. This concludes the demonstration of gathering information through analysis of the
             email header using eMailTrackerPro.
17. Close all open windows and document all the acquired information.
Question 2.7.1.1
The information gathered in the previous steps may not be sufficient to reveal the potential
vulnerabilities of the target. There could be more information available that could help in finding
loopholes in the target. As an ethical hacker, you should look for as much information as
possible about the target using various tools. This lab activity will demonstrate what other
information you can extract from the target using various footprinting tools.
Lab Objectives
Footprinting tools are used to collect basic information about the target systems in order to
exploit them. Information collected by the footprinting tools contains the target's IP location
information, routing information, business information, address, phone number and social
security number, details about the source of an email and a file, DNS information, domain
information, etc.
Here, we will consider www.certifiedhacker.com as a target website. However, you can select a
target domain of your choice.
The results obtained might differ when you perform this lab task.
         1. In the Parrot Security machine, open a Terminal window and execute sudo
            su to run the programs as a root user (When prompted, enter the password toor).
         2. Now, run cd command to jump to the root directory and run recon-ng command
            to launch the application.
3. Run help command to view all the commands that allow you to add/delete
   records to a database, query a database, etc.
4. Run marketplace install all command to install all the modules available in
   recon-ng.
9. To create the workspace, run workspaces create CEH command. This creates a
   workspace named CEH.
10. Enter workspaces list. This displays a list of workspaces (along with the
    workspace added in the previous step) that are present within the workspaces
    databases.
11. Add a domain in which you want to perform network reconnaissance.
13. Under domain (TEXT) option type certifiedhacker.com and press Enter. In
    the notes (TEXT) option press Enter. This adds certifiedhacker.com to the
    present workspace.
14. You can view the added domain by issuing the show domains command, as
    shown in the screenshot.
15. Harvest the hosts-related information associated with certifiedhacker.com by
    loading network reconnaissance modules such as brute_hosts, Netcraft, and
    Bing.
16. Issue modules load brute command to view all the modules related to brute
    forcing. In this task, we will be using
    the recon/domains-hosts/brute_hosts module to harvest hosts.
17. To load the recon/domains-hosts/brute_hosts module, issue modules load
    recon/domains-hosts/brute_hosts command.
18. Issue run command. This begins to harvest the hosts, as shown in the screenshot.
19. Observe that hosts have been added by running
    the recon/domains-hosts/brute_hosts module.
20. You have now harvested the hosts related to certifiedhacker.com using the
    brute_hosts module. You can use other modules such as Netcraft and Bing to
    harvest more hosts.
To resolve hosts using the Bing module, use the following commands:
          o   back
          o   modules load recon/domains-hosts/bing_domain_web
          o   run
21. Now, perform a reverse lookup for each IP address (the IP address that is
    obtained during the reconnaissance process) to resolve to respective hostnames.
22. Execute modules load reverse_resolve command to view all the modules
    associated with the reverse_resolve keyword. In this task, we will be using
    the recon/hosts-hosts/reverse_resolve module.
23. Run the modules load recon/hosts-hosts/reverse_resolve command to load the
    module.
25. Once done with the reverse lookup process, run the show hosts command. This
    displays all the hosts that are harvested so far, as shown in the screenshot.
26. Now, use the back command to go back to the CEH attributes terminal.
27. Now, that you have harvested several hosts, we will prepare a report containing
    all the hosts.
28. Execute modules load reporting command to view all the modules associated
    with the reporting keyword. In this lab, we will save the report in HTML format.
    So, the module used is reporting/html.
31. Use the run command and press Enter to create a report for all the hosts that
    have been harvested.
35. You can expand the Hosts node to view all the harvested hosts, as shown in the
    screenshot.
36. Close all open windows.
37. Until now, we have used the Recon-ng tool to perform network reconnaissance
    on a target domain
39. Open a Terminal window and execute sudo su to run the programs as a root
    user (When prompted, enter the password toor).
40. Run cd command to jump to the root directory and run recon-ng command.
44. Run the info command command to view the options required to run this
    module.
48. Now, we will use Recon-ng to extract a list of subdomains and IP addresses
    associated with the target URL.
49. Open a Terminal window and execute sudo su to run the programs as a root
    user (When prompted, enter the password toor).
50. Now, run cd command to jump to the root directory and run recon-ng command.
51. To extract a list of subdomains and IP addresses associated with the target URL,
    we need to load the recon/domains-hosts/hackertarget module.
         54. This concludes the demonstration of gathering host information of the target
             domain and gathering personnel information of a target organization.
55. Close all open windows and document all the acquired information.
Question 2.8.1.1
Use the Recon-ng tool to gather personnel information. Enter the Recon-ng module name that
extracts the contacts associated with the domain and displays them.
Lab 9: Perform Footprinting using AI
Lab Scenario
In this lab, you will use AI to analyze and map digital footprints from social media data. The AI
will identify patterns and highlight privacy risks. By comparing AI-generated insights with
manual analysis, students will understand the power and limitations of AI in cybersecurity.
Lab Objectives
Footprinting using AI accelerates the reconnaissance process by automating data collection and
analysis, allowing security professionals to uncover vulnerabilities more efficiently. AI-powered
footprinting enhances threat intelligence by identifying patterns and anomalies in vast amounts
of data, providing deeper insights into potential risks. As an ethical hacker you should look for as
much information as possible about the target using AI.
The commands generated by ShellGPT may vary depending on the prompt used and the tools
available on the machine. Due to these variables, the output generated by ShellGPT might differ
from what is shown in the screenshots. These differences arise from the dynamic nature of the
AI's processing and the diverse environments in which it operates. As a result, you may observe
differences in command syntax, execution, and results while performing this lab task.
         1. Click Parrot Security to switch to Parrot machine, and login with attacker/toor.
            Open a Terminal window and execute sudo su to run the program as a root user
            (When prompted, enter the password toor).
4. ShellGPT will harvest the emails using theHarvester tool and displays the email
   and host list.
5. We will perform footprinting through social networking sites using ShellGPT, to
   do so run sgpt --chat footprint --shell "Use Sherlock to gather personal
   information about 'Sundar Pichai' and save the result in
   recon2.txt" command.
8. We will perform DNS lookup using ShellGPT, to do so, run sgpt --chat
   footprint --shell "Install and use DNSRecon to perform DNS enumeration
   on the target domain www.certifiedhacker.com" command.
13. Close all open windows and document all the acquired information.
Question 2.9.1.1