0% found this document useful (0 votes)
198 views2 pages

Lab Assignment 6 new

This lab assignment for M.Tech CSE-IS students at Sardar Vallabhbhai National Institute of Technology focuses on the ethical hacking phases of Footprinting and Reconnaissance. Students are instructed to gather publicly available information about a target organization using both passive and active techniques, while ensuring ethical compliance. The assignment requires documentation of findings, including screenshots, and a structured report summarizing the analysis and security recommendations.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
198 views2 pages

Lab Assignment 6 new

This lab assignment for M.Tech CSE-IS students at Sardar Vallabhbhai National Institute of Technology focuses on the ethical hacking phases of Footprinting and Reconnaissance. Students are instructed to gather publicly available information about a target organization using both passive and active techniques, while ensuring ethical compliance. The assignment requires documentation of findings, including screenshots, and a structured report summarizing the analysis and security recommendations.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Sardar Vallabhbhai National Institute of Technology,Surat

Ethical Hacking and Penetration Testing

2 Semester, M.Tech CSE-IS


nd

Lab Assignment 6 : Footprinting and Reconnaissance

Aim & Objective: This lab aims to introduce students to the first phase of ethical hacking—
Footprinting and Reconnaissance. The objective is to gather publicly available information
about a target organization using ethical and legal methods.

Instructions:

1. Choose a target website or organization (only for practice purposes, such as


"testphp.vulnweb.com").
2. Use passive and active footprinting techniques to collect data.
3. Document all findings, including screenshots of key results.
4. Ensure ethical compliance and do not engage in unauthorized scanning.

Part 1: Passive Footprinting

1. Search Engine Information Gathering:

 Utilize Google search operators to extract useful data.


 Example queries:
o site:example.com (Find indexed pages)
o intitle:"Index of /" (Identify open directories)
o filetype:pdf site:example.com (Locate hosted PDFs)
 Document and analyze search results.

2. WHOIS Lookup:

 Use WHOIS tools to find domain registration details.


 Recommended tools:
o whois.domaintools.com
o Linux whois command
 Capture information about the domain owner, registrar, and technical details.

3. Netcraft Analysis:

 Visit Netcraft Site Report to investigate hosting details.


 Identify server type, technologies, and historical data.

Part 2: Active Footprinting (With Permission)

4. DNS Enumeration:
Sardar Vallabhbhai National Institute of Technology,Surat
Ethical Hacking and Penetration Testing

2 Semester, M.Tech CSE-IS


nd

 Use nslookup or dig to query DNS records.


 Commands:
o nslookup example.com
o dig example.com ANY
 Record information about mail servers, subdomains, etc.

5. Network Scanning:

 Conduct Ping Sweep to check for active hosts.


o Example: ping -c 4 example.com
 Perform Traceroute to analyze network paths.
o Linux: traceroute example.com
o Windows: tracert example.com

6. Port Scanning:

 Scan for open ports using nmap.


o Example: nmap -Pn -A example.com
 Identify running services and vulnerabilities.

7. Subdomain Enumeration:

 Use tools like Sublist3r or crt.sh to find subdomains.


o Example: python3 sublist3r.py -d example.com

8. Website Analysis:

 Identify web technologies using WhatWeb or Wappalyzer.


o Example: whatweb example.com
 Check for exposed directories with Dirb or Dirbuster.
o Example: dirb http://example.com

Reporting & Analysis

1. Summarize findings from each technique used.


2. Highlight potential security risks and vulnerabilities.
3. Provide recommendations to mitigate security threats.

Submission Requirements:

 A well-structured report with screenshots and explanations.


 Clear documentation of tools and methods used.
 Observations and security suggestions.
 Submit in PDF format with a proper conclusion.

You might also like