We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 27
Lab 1 (part#1) report
Footprinting and Reconnaissance
1. Perform footprinting through search engines
o Gather information using advanced Google hacking techniques
o Gather information from video search engines o Gather information from FTP search engines o Gather information from IoT search engines 2. Perform footprinting through web services
o Find the company’s domains and sub-domains using Netcraft
o Gather personal information using PeekYou online people search service o Gather an email list using theHarvester o Gather information using deep and dark web searching o Determine target OS through passive footprinting 3. Perform footprinting through social networking sites o Gather employees’ information from LinkedIn using theHarvester o Gather personal information from various social networking sites using Sherlock 4. Perform website footprinting o Gather information about a target website using ping command line utility o Gather information about a target website using Photon o Gather information about a target website using Central Ops o Extract a company’s data using Web Data Extractor o Mirror a target website using HTTrack Web Site Copier o Mirror a target website using HTTrack Web Site Copier o Gather a wordlist from the target website using CeWL