Introduction
Scouting the target
()
What you should know
()
Hacking ethically
()
1. Reconnaisance Overview
Footprinting and reconnaissance
()
Using competitive intelligence
()
Search engines and Google hacking
()
Getting social
()
Using AnyWho, Spokeo, Yansi
()
Tracking online reputation
()
2. Using Email and Websites
Footprinting websites and email
()
Mirroring websites
()
Challenge: Mirroring a website
()
Solution: Mirroring a website
()
Monitoring websites
()
Investigating email
()
OSINT tools
()
Challenge: Understanding email headers
()
Solution: Understanding email headers
()
3. Discovering Reconnaissance Tools
Footprinting using DNS
()
Domain name generators
()
Understanding ICMP
()
Using Ping and Tracert
()
Analyzing the path
()
nslookup and dig
()
Conclusion
Footprinting countermeasures
()
Footprinting pen testing and reports
()
Next steps
()
Ex_Files_Ethical_Hacking_Footprinting_Reconnaissance.zip
(260 KB)