Lab 1 - Footprinting Using NIKTO and Theharvester
Lab 1 - Footprinting Using NIKTO and Theharvester
Description: In this lab, we will use the Nikto tool to gather information from a website.
Specifically, we are looking for possible vulnerabilities on the website.
**We are using the evasion switch (-e) and the number 1 (to specify random encoding) to help
us be a little bit stealthier when running the scan. We also use -h to define the hostname or IP
address.
Description: In this lab, we are going to to use a tool called theHarvester. This tool is useful for
gathering information on subdomains, employee names, emails, open ports, and banners. It
gathers the information from public sources, like regular search engines and Shodan. You can
read more about it here: https://tools.kali.org/information-gathering/theharvester
Step 3: At the prompt, type theharvester -h to view the help file for the tool.
Step 4: We are just going to use one of the example statements from the help section. Please
type this command: theharvester -d microsoft.com -l 50 -b google -s
-d is the domain or company name to search. In this case, we are searching microsoft.com
-l is used to limit the results. In this case, we are limiting to just 50 results.
-b is used to define our data source. In this case, we are just using google.
Question 1: Were you able to see any ip addresses in the output? If yes, write at least two
of them here