0% found this document useful (0 votes)
256 views

Lab 1 - Footprinting Using NIKTO and Theharvester

The document describes using the Nikto and theHarvester tools to gather information from websites during a footprinting lab with two parts. In part one, Nikto is used to scan a test website to identify possible vulnerabilities. In part two, theHarvester searches publicly available sources for subdomains, employee names, emails, open ports and banners associated with a given domain.

Uploaded by

Pratham Pandey
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
256 views

Lab 1 - Footprinting Using NIKTO and Theharvester

The document describes using the Nikto and theHarvester tools to gather information from websites during a footprinting lab with two parts. In part one, Nikto is used to scan a test website to identify possible vulnerabilities. In part two, theHarvester searches publicly available sources for subdomains, employee names, emails, open ports and banners associated with a given domain.

Uploaded by

Pratham Pandey
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Footprinting Lab 1 (part-1): Nikto

Description: In this lab, we will use the Nikto tool to gather information from a website.
Specifically, we are looking for possible vulnerabilities on the website.

Requirements for the lab: Kali Linux / Parrot OS

Step 1: Launch your Kali virtual machine and log in

Step 2: Launch a Terminal window

Step 3: At the prompt, enter: nikto -e 1 -h webscantest.com

**We are using the evasion switch (-e) and the number 1 (to specify random encoding) to help
us be a little bit stealthier when running the scan. We also use -h to define the hostname or IP
address.

Note: It will take several minutes to run the scan.

Question 1: Do you see any possible vulnerabilities from the website?

If yes, please write some of them below:


Footprinting Lab 1 (part-2): theHarvester

Description: In this lab, we are going to to use a tool called theHarvester. This tool is useful for
gathering information on subdomains, employee names, emails, open ports, and banners. It
gathers the information from public sources, like regular search engines and Shodan. You can
read more about it here: https://tools.kali.org/information-gathering/theharvester

Requirements for the lab: Kali Linux / Parrot OS

Step 1: Launch you Kali / Parrot OS machine and login

Step 2: Open a Terminal window

Step 3: At the prompt, type theharvester -h to view the help file for the tool.

Step 4: We are just going to use one of the example statements from the help section. Please
type this command: theharvester -d microsoft.com -l 50 -b google -s

-d is the domain or company name to search. In this case, we are searching microsoft.com

-l is used to limit the results. In this case, we are limiting to just 50 results.

-b is used to define our data source. In this case, we are just using google.

-s allows us to use the Shodan database to query any discovered hosts.

Question 1: Were you able to see any ip addresses in the output? If yes, write at least two
of them here

Question 2: What other information did you find?

You might also like