FOOTPRINTING PRACTICAL
FOOTPRINTING PRACTICAL
1. FOOTPRINTING
Footprinting refers to the process of gathering as much information as possible about a target system
or network. The primary objective of footprinting is to gather intelligence information that can be
used to plan further attacks or assess the security posture of the target.
This lab will demonstrate on how Footprinting performed using several tools such as; whois,
nslookup, dig, whatweb, theharvester, sublist3r, p0f which most of them are available in Kali
Linux Platform.
Steps involved:
a. whois tool
i. Open your Kali Linux, then open the “Terminal”
ii. Type the command “whois [domain name/url of your target]” e.g. “whois
vulnweb.com”
iii. The information about registration for the domain “vulnweb.com” will be displayed.
b. nslookup tool
i. Open your Kali Linux, then open the “Terminal”
ii. Type the command “nslookup [domain name/url of your target]” e.g. “nslookup
vulnweb.com”
iii. The details about server, address and non-authoritative for the domain
“vulnweb.com” will be displayed.
c. dig tool
i. Open your Kali Linux, then open the “Terminal”
ii. Type the command “dig [domain name/url of your target]” e.g. “dig
vulnweb.com”
iii. The details about domain name and IP addresses for the domain “vulnweb.com” will
be displayed.
d. whatweb tool
i. Open your Kali Linux, then open the “Terminal”
ii. Type the command “whatweb [domain name/url of your target]” e.g. “whatweb
www.vulnweb.com”
iii. The details about the website “www.vulnweb.com” will be displayed.
e. theHarvester
i. Open your Kali Linux, then open the “Terminal”
ii. Type the command “theHarvester --help”
iii. The “theHarvester” options will be displayed.
iv. Type the command “theHarvester -d vulnweb.com -l 300 -b google”
Where: -d: represents domain name, -l: represents number of queries, -b: represents
data source.
g. p0f
i. Open your Kali Linux, then open the “Terminal”
ii. Type the command “p0f” or “p0f -i eth0”
iii. Then open your web browser in Kali Linux
iv. Type any target website/domain e.g. “www.vulnweb.com”
v. Then go back to the “Terminal” where “p0f” tool is running
vi. The details about the website “www.vulnweb.com” will be displayed.
LAB OUTCOME:
DISCLAIMER!
This document is for educational and research purposes only. Do not attempt to violate thelaw with anything
contained here. If this is your intention, then you are not supposed to be part of this training. Any actions and or
activities related to the material contained within this document is solely your responsibility. The misuse of the
information in this document can result in criminal charges brought against the persons inquestion. The developer
and the owner of this document will not be held responsible in the event any criminal charges be brought against any
individuals misusing the information in this document to break the law.