< All Penetration Testing and Ethical Hacking (Archive) Notes

Chang Tan Lister | Penetration Testing and Ethical Hacking | Module 02 - Footprinting

By: Chang Tan Lister | Related Course: Penetration Testing and Ethical Hacking (Archive) | Published: February 13, 2017 | Modified: February 13, 2017
Join Cybrary


nslookup lab is really useful. Type ’help’ to go into options beyond the standard settings



Use disclosed information, paint a larger picture before attacking your target



  1. Internal DNS
  2. Private Websites
  3. ”Dumpster Diving”
  4. ”Shoulder Surfing”, literally visual snooping
  5. Eavesdropping, (literally as well)


  1. 1. Phone numbers
  2. 2. Network (Types, Implementation)
  3. 3. Public websites
  4. 4. Email Header


  1. google
  2. social networks (frequency of updates)
  3. whois
  4. dns (structure)


  1. IP Blocks
  2. Network Blocks (Do they have the entire IP block for themselves?)
  3. web server content (HTML? We can use DirBuster on it)
  4. Source Code of their public website
  5. Website mirroring
  6. OS Detection


  1. DB
  2. Other search engines (not incl. Google)
  3. Google Earth (pop the addr from WHOIS/other into it)
  4. ”People Sites”, LinkedIn. Learn their skillsets and backgrounds.
  5. Financial web (fin company)
  6. Job sites (They are looking for X as a expert in X)
  7. Google Alerts website (emailed to ourselves so we dont have to constantly search)
  8. Internet Archives (MySpace)
  9. Web monitoring websites
  10. Patent/Trademark information
  11. CUstomer service information
  12. Press releases

Don’t get lost into the tools and techniques. ALways look at the big pictures and every option available to you.


NotepadPing lab

Change the bytes of the data to trigger replies versus the replies being ignored.


This is a ping test on WINDOWS, NOT Linux.

< All Penetration Testing and Ethical Hacking (Archive) Notes
Join Cybrary

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?