Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Ethical Hacking: Footprinting and Reconnaissance

Description

Learn the concepts, tools, and techniques behind footprinting: ethical hacking techniques for finding information about computers and the people they belong to.

Tags

Syllabus

Introduction
  • Scouting the target
  • What you should know
  • Hacking ethically
1. Reconnaisance Overview
  • Footprinting and reconnaissance
  • Using competitive intelligence
  • Search engines and Google hacking
  • Getting social
  • Using AnyWho, Spokeo, Yansi
  • Tracking online reputation
2. Using Email and Websites
  • Footprinting websites and email
  • Mirroring websites
  • Challenge: Mirroring a website
  • Solution: Mirroring a website
  • Monitoring websites
  • Investigating email
  • OSINT tools
  • Challenge: Understanding email headers
  • Solution: Understanding email headers
3. Discovering Reconnaissance Tools
  • Footprinting using DNS
  • Domain name generators
  • Understanding ICMP
  • Using Ping and Tracert
  • Analyzing the path
  • nslookup and dig
Conclusion
  • Footprinting countermeasures
  • Footprinting pen testing and reports
  • Next steps

Online Course


Ethical Hacking: Footprinting and Reconnaissance

Affiliate notice

Learn the concepts, tools, and techniques behind footprinting: ethical hacking techniques for finding information about computers and the people they belong to.

Introduction
  • Scouting the target
  • What you should know
  • Hacking ethically
1. Reconnaisance Overview
  • Footprinting and reconnaissance
  • Using competitive intelligence
  • Search engines and Google hacking
  • Getting social
  • Using AnyWho, Spokeo, Yansi
  • Tracking online reputation
2. Using Email and Websites
  • Footprinting websites and email
  • Mirroring websites
  • Challenge: Mirroring a website
  • Solution: Mirroring a website
  • Monitoring websites
  • Investigating email
  • OSINT tools
  • Challenge: Understanding email headers
  • Solution: Understanding email headers
3. Discovering Reconnaissance Tools
  • Footprinting using DNS
  • Domain name generators
  • Understanding ICMP
  • Using Ping and Tracert
  • Analyzing the path
  • nslookup and dig
Conclusion
  • Footprinting countermeasures
  • Footprinting pen testing and reports
  • Next steps