0% found this document useful (0 votes)
13 views2 pages

FOOTPRINTING PRACTICAL

The document outlines a Cyber Security and Forensic course focusing on practical lab sessions for Footprinting, which involves gathering information about a target system or network using various tools available in Kali Linux. It details step-by-step instructions for using tools like whois, nslookup, dig, whatweb, theHarvester, sublist3r, and p0f to collect sensitive information. Additionally, it includes a disclaimer emphasizing the educational purpose of the document and the responsibility of users not to misuse the information provided.

Uploaded by

bielom41
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views2 pages

FOOTPRINTING PRACTICAL

The document outlines a Cyber Security and Forensic course focusing on practical lab sessions for Footprinting, which involves gathering information about a target system or network using various tools available in Kali Linux. It details step-by-step instructions for using tools like whois, nslookup, dig, whatweb, theHarvester, sublist3r, and p0f to collect sensitive information. Additionally, it includes a disclaimer emphasizing the educational purpose of the document and the responsibility of users not to misuse the information provided.

Uploaded by

bielom41
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

CYBER SECURITY AND FORENSIC COURSE

PRACTICALS - LAB SESSIONS

1. FOOTPRINTING

Footprinting refers to the process of gathering as much information as possible about a target system
or network. The primary objective of footprinting is to gather intelligence information that can be
used to plan further attacks or assess the security posture of the target.

This lab will demonstrate on how Footprinting performed using several tools such as; whois,
nslookup, dig, whatweb, theharvester, sublist3r, p0f which most of them are available in Kali
Linux Platform.

Steps involved:

a. whois tool
i. Open your Kali Linux, then open the “Terminal”
ii. Type the command “whois [domain name/url of your target]” e.g. “whois
vulnweb.com”
iii. The information about registration for the domain “vulnweb.com” will be displayed.

b. nslookup tool
i. Open your Kali Linux, then open the “Terminal”
ii. Type the command “nslookup [domain name/url of your target]” e.g. “nslookup
vulnweb.com”
iii. The details about server, address and non-authoritative for the domain
“vulnweb.com” will be displayed.

c. dig tool
i. Open your Kali Linux, then open the “Terminal”
ii. Type the command “dig [domain name/url of your target]” e.g. “dig
vulnweb.com”
iii. The details about domain name and IP addresses for the domain “vulnweb.com” will
be displayed.

d. whatweb tool
i. Open your Kali Linux, then open the “Terminal”
ii. Type the command “whatweb [domain name/url of your target]” e.g. “whatweb
www.vulnweb.com”
iii. The details about the website “www.vulnweb.com” will be displayed.

e. theHarvester
i. Open your Kali Linux, then open the “Terminal”
ii. Type the command “theHarvester --help”
iii. The “theHarvester” options will be displayed.
iv. Type the command “theHarvester -d vulnweb.com -l 300 -b google”

Where: -d: represents domain name, -l: represents number of queries, -b: represents
data source.

v. The details about the domain “vulnweb.com” will be displayed.


f. sublist3r
i. Open your Kali Linux, then open the “Terminal”
ii. Type the command “sublist3r” to see if installed in Kali Linux
iii. If the tool is not installed then use the command “apt-get install sublist3r”
iv. After installation then type again the command “sublist3r -d vulnweb.com”
v. The details about the domain “vulnweb.com” will be displayed.

g. p0f
i. Open your Kali Linux, then open the “Terminal”
ii. Type the command “p0f” or “p0f -i eth0”
iii. Then open your web browser in Kali Linux
iv. Type any target website/domain e.g. “www.vulnweb.com”
v. Then go back to the “Terminal” where “p0f” tool is running
vi. The details about the website “www.vulnweb.com” will be displayed.

LAB OUTCOME:

• Awareness of Footprinting issues


• Use of Kali Linux OS
• Use of several tools to conduct Footprinting
• Obtain sensitive information from the target source

************************ END OF LAB **************************

DISCLAIMER!

This document is for educational and research purposes only. Do not attempt to violate thelaw with anything
contained here. If this is your intention, then you are not supposed to be part of this training. Any actions and or
activities related to the material contained within this document is solely your responsibility. The misuse of the
information in this document can result in criminal charges brought against the persons inquestion. The developer
and the owner of this document will not be held responsible in the event any criminal charges be brought against any
individuals misusing the information in this document to break the law.

You might also like