9. Footprinting using footprinting tools
Footprinting tools are used to collect basic information about the target systems in order to exploit them.
1. Footprinting with Recon-ng
Start the tool
recon-nginstall all the modules
marketplace install alllist all modules
modules searchNow create a workspace and select it
workspaces create CEH
workspaces select CEH
workspaces list //if you want to see the list of workspacesAdd a website to the recon list
db insert domains
show domains // to list the domains
load the module for brute forcing hosts
modules load recon/domains-hosts/brute_hostsNow run it with run command
You can view the hosts with the following command
show hostsNow to resolve the host with bing
back
modules load recon/domains-hosts/bing_domain_web
runNow reverse lookup
back
modules load recon/netblocks-hosts/reverse_resolvecreate a report
modules load reporting/html
options set CREATOR ammar
options set CUSTOMER cehWhois with Recon-ng
create a new workspace
workspaces create whois
workspaces select whoisNow select the whois module
modules load recon/domains-contacts/whois_pocsSet the website as target
options set source SOURCE google.comCheck the names and usernames on social media.
modules load recon/profiles-profiles/namechkoptions set SOURCE ammarchecking profiles on social media (very good results)
modules load profiler
options set SOURCE ammar
runGetting subdomains and other info about the target (Most important)
modules load hackertarget
options set SOURCE certifiedhacker.com
run
2. Maltego recon
website>DNS using name schema>DNS SOA>DNS Mx>DNA nameservers>DNS IP address>location>
website>domains>whois
3. OSRFramework
Good for quickly finding subdomains.
sudo pip3 install osrframework //installationRun as root.
domainfy -n eccouncil -t all
Finding user accounts of a username
searchfy -q ammar
4. Footprinting using FOCA (windows)
Domains and document analysis
5. Billcipher
Allows to select the modules do the recon.
6. OSINT Framework
Other tools
Last updated
Was this helpful?