In this tutorial, you will learn Foot printing and Reconnaissance, Information Gathering, Types of Reconnaissance, Wayback Machine, Whois and Reverse Whois.
Class 1 - Ethical Hacking Course | Cyber security | Information Security
• Ethical Hacking Course | Cyber security |...
00:18 - Reconnaissance
The World English Dictionary defines reconnaissance as the process of obtaining information about the position, activities, resources, etc.
00:31 - Types of Reconnaissance
Passive Reconnaissance
Active Reconnaissance
01:14 - What Ethical Hackers / Pentester looking for ?
Network Information
Domain names
Internal domains
IP addresses
Unmonitored/private websites
TCP/UDP services
VPN/IDS/IPS/access controls
Phone numbers/VoIP
Operating System Information
User & group names/info
Banner grabbing
System architecture
Remote systems
System names
Passwords
Organization Information
Organization website
Company directory
Employee details
Location details
Addresses/phone numbers
Comments in HTML source code
Security policies deployed
Web server links
Background of organization
News/press releases
3:28 - External Network
Network
Phone
Website
Whois
Source Code
Archive Sites
Website Mirroring
Web Server Content
Web Monitoring
DNS
IP Blocks
Email Header
Google and Search Engine
People Sites
Social Networks
Job Sites
Alert Website
Google Hacking
06:13 - Internal Network
Internal DNS
Private Websites
Dumpster Diving
Shoulder Surfing
Eavesdropping
Reconnaissance Foot printing
07:30 - Web Site
1. Visit website
Employee details
Location details
Addresses
Phone numbers
09:50 - 2. find sitemap and robots.txt
robots.txt - Disallow for google and search eng
sitemap.html - user index
sitemap.xml - google index
11:00 - 3. create sitemap online
www.convertcsv.com/url-extractor.htm
www.xml-sitemaps.com/
4. Search for external links
14:37 - 5. Locally mirroring the website
Read Soure Code
HTTrack
httrack
wget
wget -m https://www.------.com
16:55 - 6. Wayback Machine
web.archive.org/
22:14 - Whois
Registrant Name, Name Servers, Email,Phone
whois armourinfosec.com
who.is/
in.godaddy.com/whois
25:36 - Reverse Whois
viewdns.info/reversewhois/
www.reversewhois.io/
www.whoxy.com/reverse-whois/
Oracle VM VirtualBox: Hacking lab setup for Hackers
• Oracle VM VirtualBox: Hacking lab setup fo...…
Kali Linux Basic Fundamentals | Kali Linux Basic Commands
• Kali Linux Basic Fundamentals | Kali Linux...…
Oracle VM VirtualBox: Hacking lab setup for Hackers
www.thehackersworld.com/course/oracle-vm-virtualbo…
Kali Linux Basic Fundamentals
www.thehackersworld.com/course/kali-linux-basic-fu…
PLEASE SUBSCRIBE & FOLLOW ;-)
TWITTER: twitter.com/ArmourInfosec
FACEBOOK: www.facebook.com/ArmourInfosec
LINKEDIN: www.linkedin.com/company/armourinfosec/
INSTAGRAM: www.instagram.com/armourinfosec/
コメント