9. Footprinting using footprinting tools
Footprinting tools are used to collect basic information about the target systems in order to exploit them.
Last updated
Footprinting tools are used to collect basic information about the target systems in order to exploit them.
Last updated
Start the tool
install all the modules
list all modules
Now create a workspace and select it
Add a website to the recon list
load the module for brute forcing hosts
Now run it with run command
You can view the hosts with the following command
Now to resolve the host with bing
Now reverse lookup
create a report
Whois with Recon-ng
create a new workspace
Now select the whois module
Set the website as target
Check the names and usernames on social media.
checking profiles on social media (very good results)
Getting subdomains and other info about the target (Most important)
website>DNS using name schema>DNS SOA>DNS Mx>DNA nameservers>DNS IP address>location>
website>domains>whois
Good for quickly finding subdomains.
Run as root.
-n specify nickname of domain
-t specify list of top level domains where nick will be searched
Finding user accounts of a username
-q specifies the query
Domains and document analysis
Allows to select the modules do the recon.