< All Penetration Testing and Ethical Hacking (Archive) Notes

sicarii | Penetration Testing and Ethical Hacking | Module 02 - Footprinting

By: Joeri Jungschlager | Related Course: Penetration Testing and Ethical Hacking (Archive) | Published: November 27, 2017 | Modified: November 28, 2017
Join Cybrary

Notepad#Footprinting NSlookup

NSlook up 


#Greyhat #blackhat

Works mainly for the US 



NotepadFootprint Essentials

Disclosure Oriented Its about the target 

Internal DNS
Private Websites (data I am not suppose to have)
Dumpster Diving 
Shoulder Surfing (what can you see)

Eavesdropping, wiretapping and such. 

Phone, Network, website, email HEADER 

*Google, *Whois, *DNSstructure, *SocialNetworks


#IPadresses, #Networkblocks

webserver content, source code website mirroring. Nmap (OS Detecting) 

URL Analysis

People Sites- what about the employers

#SetupAlerts such as Google News

Archive Sites

#Google Hacking 


Document pentest target. 


Domain name blocks


Could the information gained be used by an hack? Or the client could be financially targeted or fined. 

You want the information to come to you. dnsinfo and whois. e-mail 

NotepadPath Analyzer Pro

Typically layer 3 sometimes 4, could be above. 

Runs on Debian & Red Hat

Always staet with ICMP

then TCP

< All Penetration Testing and Ethical Hacking (Archive) Notes
Join Cybrary

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?