SlideShare a Scribd company logo
FUNDAMENTALS OF
CYBERSECURITY
ACTIVITY- 1
TOPIC: TYPES OF HACKER AND
RECONNAISSANCE
Submitted by-
Lakshay NR(21bcar0309)
White
Hat
Hackers
Black
Hat
Hackers
Grey
Hat
Hackers
Types of hacker

 White Hat hackers are also known as Ethical
Hackers. They never intent to harm a system, rather
they try to find out weaknesses in a computer or a
network system as a part of penetration testing and
vulnerability assessments.
 Ethical hacking is not illegal and it is one of the
demanding jobs available in the IT industry. There
are numerous companies that hire ethical hackers for
penetration testing and vulnerability assessments.
white hat hackers uses tools like Nmap (Network
Mapper), Nessus, Nikto, Kismet,etc.
White Hat Hackers

 Black Hat hackers, also known as crackers, are those
who hack in order to gain unauthorized access to a
system and harm its operations or steal sensitive
information.
 Black Hat hacking is always illegal because of its bad
intent which includes stealing corporate data,
violating privacy, damaging the system, blocking
network communication, etc.
Black hat hackers use tools like NetStumbler,
Acunetix, Netsparker, and Intruder.
Black Hat Hackers

 Grey hat hackers are a blend of both black hat and
white hat hackers. They act without malicious intent
but for their fun, they exploit a security weakness in
a computer system or network without the owner’s
permission or knowledge.
 Their intent is to bring the weakness to the attention
of the owners and getting appreciation or a little
bounty from the owners.
Grey hat hackers use tools like Nmap, Metasploit,
Aircrack-Ng, etc
Grey Hat Hackers


Red Hat Hackers
Blue Hat Hackers
Elite Hackers
Script Kiddie
Neophyte
Hacktivist
Phreaker
Miscellaneous Hackers

Red hat hackers are again a blend of
both black hat and white hat hackers.
They are usually on the level of hacking
government agencies, top-secret
information hubs, and generally
anything that falls under the category
of sensitive information.
Red Hat Hackers
A blue hat hacker is someone outside
computer security consulting firms who is
used to bug-test a system prior to its launch.
They look for loopholes that can be exploited
and try to close these gaps. Microsoft also
uses the term BlueHat to represent a series of
security briefing events.
Blue Hat Hackers


This is a social status among hackers, which
is used to describe the most skilled. Newly
discovered exploits will circulate among
these hackers.
Elite Hackers
A script kiddie is a non-expert who breaks
into computer systems by using pre-
packaged automated tools written by others,
usually with little understanding of the
underlying concept, hence the term Kiddie.
Script Kiddie

A neophyte, "n00b", or "newbie" or "Green
Hat Hacker" is someone who is new to
hacking or phreaking and has almost no
knowledge or experience of the workings of
technology and hacking.
Neophyte


A hacktivist is a hacker who utilizes
technology to announce a social, ideological,
religious, or political message. In general,
most hacktivism involves website
defacement or denialof-service attacks
Hacktivist
A hacker who identifies and exploits
weaknesses in telephones instead of
computers.
Phreaker

RECONNAISSANCE
Footprinting is a part of a larger process known as
reconnaissance. Reconnaissance is the information-
gathering stage of ethical hacking, where you collect
data about the target system. This data can include
anything from network infrastructure to employee
contact details. The goal of reconnaissance is to identify
as many potential attack vectors as possible.
Data collected from reconnaissance may include:
Security policies. Knowing an organization’s security policies can
help you find weaknesses in their system.
Network infrastructure. A hacker needs to know what type of
network the target is using (e.g., LAN, WAN, MAN), as well as the
IP address range and subnet mask.
Employee contact details. Email addresses, phone numbers, and
social media accounts can be used to launch social engineering
attacks.
Host information. Information about specific hosts, such as
operating system type and version, can be used to find
vulnerabilities.
RECONNAISSANCE USING
GOOGLE DORKS
Google's search engine has its own built-in query language. The
following list of queries can be run to find a list of files, find
information about your competition, track people, get information
about SEO backlinks, build email lists, and of course, discover web
vulnerabilities.
Let's look at the most popular Google Dorks and what they do.
cache: this dork will show you the cached version of any website,
e.g. cache:securitytrails.com
allintext: searches for specific text contained on any web page, e.g.
allintext: hacking tools
allintitle: exactly the same as allintext, but will show pages that
contain titles with X characters, e.g. allintitle:"Security Companies"
allinurl: it can be used to fetch results whose URL contains all the
specified characters, e.g: allinurl:clientarea
filetype: used to search for any kind of file extensions, for example,
if you want to search for pdf files you can use: email security
filetype: pdf
inurl: this is exactly the same as allinurl, but it is only useful for
one single keyword, e.g. inurl:admin
intitle: used to search for various keywords inside the title.
RECONNAISSANCE USING
FTP SEARCH ENGINE
NAPALM FTP Indexer : Napalm has more than 949
million files and 14,000 FTP servers in their index. It
uses a crawler that updates their database every 2 to 4
days, giving higher priority to the most frequently
accessed servers.
RECONNAISSANCE USING IOT
SEARCH ENGINE
Shodan is the world's first search engine for Internet-
connected devices. Discover how Internet intelligence
can help you make better decisions.
FINDING DOMAINS AND SUB-
DOMAINS USING NETCRAFT
GATHERING PERSONAL INFORMATION
USING PEEKYOU
FINDING EMAIL LIST USING
HARVESTER
The harvester is a command-line tool included in kali
linux that acts as a wrapper for a variety of search
engines and is used to find email accounts, subdomain
names, virtual hosts, open ports / banners, and
employee names related to a domain from different
public sources (such as search engines and PGP key
servers).
PASSIVE FOOTPRINTING
ACTIVITY1 FCS.pptx

More Related Content

Similar to ACTIVITY1 FCS.pptx

Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
Waseem Rauf
 
Hacking
Hacking Hacking
Hacking
SahilGothoskar
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
HassanAhmedShaikh1
 
Ethical hacking at warp speed
Ethical hacking at warp speedEthical hacking at warp speed
Ethical hacking at warp speed
Sreejith.D. Menon
 
Ethi mini - ethical hacking
Ethi mini - ethical hackingEthi mini - ethical hacking
Ethi mini - ethical hackingBeing Uniq Sonu
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
belsis
 
unit-1.pptx
unit-1.pptxunit-1.pptx
unit-1.pptx
Srinivas Kanakala
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
shreya_omar
 
Web hacking 1.0
Web hacking 1.0Web hacking 1.0
Web hacking 1.0
Q Fadlan
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking Attacks
Aman Gupta
 
Learn Hacking With Gflixacademy
Learn Hacking With GflixacademyLearn Hacking With Gflixacademy
Learn Hacking With Gflixacademy
Gaurav Mishra
 
Ethi mini1 - ethical hacking
Ethi mini1 - ethical hackingEthi mini1 - ethical hacking
Ethi mini1 - ethical hackingBeing Uniq Sonu
 
Hacking
HackingHacking
Hacking
pranav patade
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
baabtra.com - No. 1 supplier of quality freshers
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Vishesh Singhal
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
Animesh Behera
 
Hacking
HackingHacking
Hacking
Paidi Dinesh
 
Ehtical hacking
Ehtical hackingEhtical hacking
Ehtical hacking
Uday Verma
 

Similar to ACTIVITY1 FCS.pptx (20)

Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
 
Hacking
Hacking Hacking
Hacking
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Ethical hacking at warp speed
Ethical hacking at warp speedEthical hacking at warp speed
Ethical hacking at warp speed
 
Ethi mini - ethical hacking
Ethi mini - ethical hackingEthi mini - ethical hacking
Ethi mini - ethical hacking
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
unit-1.pptx
unit-1.pptxunit-1.pptx
unit-1.pptx
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
Web hacking 1.0
Web hacking 1.0Web hacking 1.0
Web hacking 1.0
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking Attacks
 
Learn Hacking With Gflixacademy
Learn Hacking With GflixacademyLearn Hacking With Gflixacademy
Learn Hacking With Gflixacademy
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethi mini1 - ethical hacking
Ethi mini1 - ethical hackingEthi mini1 - ethical hacking
Ethi mini1 - ethical hacking
 
Hacking
HackingHacking
Hacking
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
Hacking
HackingHacking
Hacking
 
Ehtical hacking
Ehtical hackingEhtical hacking
Ehtical hacking
 

Recently uploaded

Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 

Recently uploaded (20)

Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 

ACTIVITY1 FCS.pptx

  • 1. FUNDAMENTALS OF CYBERSECURITY ACTIVITY- 1 TOPIC: TYPES OF HACKER AND RECONNAISSANCE Submitted by- Lakshay NR(21bcar0309)
  • 3.  White Hat hackers are also known as Ethical Hackers. They never intent to harm a system, rather they try to find out weaknesses in a computer or a network system as a part of penetration testing and vulnerability assessments.  Ethical hacking is not illegal and it is one of the demanding jobs available in the IT industry. There are numerous companies that hire ethical hackers for penetration testing and vulnerability assessments. white hat hackers uses tools like Nmap (Network Mapper), Nessus, Nikto, Kismet,etc. White Hat Hackers 
  • 4.  Black Hat hackers, also known as crackers, are those who hack in order to gain unauthorized access to a system and harm its operations or steal sensitive information.  Black Hat hacking is always illegal because of its bad intent which includes stealing corporate data, violating privacy, damaging the system, blocking network communication, etc. Black hat hackers use tools like NetStumbler, Acunetix, Netsparker, and Intruder. Black Hat Hackers 
  • 5.  Grey hat hackers are a blend of both black hat and white hat hackers. They act without malicious intent but for their fun, they exploit a security weakness in a computer system or network without the owner’s permission or knowledge.  Their intent is to bring the weakness to the attention of the owners and getting appreciation or a little bounty from the owners. Grey hat hackers use tools like Nmap, Metasploit, Aircrack-Ng, etc Grey Hat Hackers 
  • 6.  Red Hat Hackers Blue Hat Hackers Elite Hackers Script Kiddie Neophyte Hacktivist Phreaker Miscellaneous Hackers
  • 7.  Red hat hackers are again a blend of both black hat and white hat hackers. They are usually on the level of hacking government agencies, top-secret information hubs, and generally anything that falls under the category of sensitive information. Red Hat Hackers
  • 8. A blue hat hacker is someone outside computer security consulting firms who is used to bug-test a system prior to its launch. They look for loopholes that can be exploited and try to close these gaps. Microsoft also uses the term BlueHat to represent a series of security briefing events. Blue Hat Hackers 
  • 9.  This is a social status among hackers, which is used to describe the most skilled. Newly discovered exploits will circulate among these hackers. Elite Hackers
  • 10. A script kiddie is a non-expert who breaks into computer systems by using pre- packaged automated tools written by others, usually with little understanding of the underlying concept, hence the term Kiddie. Script Kiddie 
  • 11. A neophyte, "n00b", or "newbie" or "Green Hat Hacker" is someone who is new to hacking or phreaking and has almost no knowledge or experience of the workings of technology and hacking. Neophyte 
  • 12.  A hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or political message. In general, most hacktivism involves website defacement or denialof-service attacks Hacktivist
  • 13. A hacker who identifies and exploits weaknesses in telephones instead of computers. Phreaker 
  • 14.
  • 15.
  • 16. RECONNAISSANCE Footprinting is a part of a larger process known as reconnaissance. Reconnaissance is the information- gathering stage of ethical hacking, where you collect data about the target system. This data can include anything from network infrastructure to employee contact details. The goal of reconnaissance is to identify as many potential attack vectors as possible.
  • 17. Data collected from reconnaissance may include: Security policies. Knowing an organization’s security policies can help you find weaknesses in their system. Network infrastructure. A hacker needs to know what type of network the target is using (e.g., LAN, WAN, MAN), as well as the IP address range and subnet mask. Employee contact details. Email addresses, phone numbers, and social media accounts can be used to launch social engineering attacks. Host information. Information about specific hosts, such as operating system type and version, can be used to find vulnerabilities.
  • 18. RECONNAISSANCE USING GOOGLE DORKS Google's search engine has its own built-in query language. The following list of queries can be run to find a list of files, find information about your competition, track people, get information about SEO backlinks, build email lists, and of course, discover web vulnerabilities. Let's look at the most popular Google Dorks and what they do. cache: this dork will show you the cached version of any website, e.g. cache:securitytrails.com allintext: searches for specific text contained on any web page, e.g.
  • 19. allintext: hacking tools allintitle: exactly the same as allintext, but will show pages that contain titles with X characters, e.g. allintitle:"Security Companies" allinurl: it can be used to fetch results whose URL contains all the specified characters, e.g: allinurl:clientarea filetype: used to search for any kind of file extensions, for example, if you want to search for pdf files you can use: email security filetype: pdf inurl: this is exactly the same as allinurl, but it is only useful for one single keyword, e.g. inurl:admin intitle: used to search for various keywords inside the title.
  • 20. RECONNAISSANCE USING FTP SEARCH ENGINE NAPALM FTP Indexer : Napalm has more than 949 million files and 14,000 FTP servers in their index. It uses a crawler that updates their database every 2 to 4 days, giving higher priority to the most frequently accessed servers.
  • 21. RECONNAISSANCE USING IOT SEARCH ENGINE Shodan is the world's first search engine for Internet- connected devices. Discover how Internet intelligence can help you make better decisions.
  • 22. FINDING DOMAINS AND SUB- DOMAINS USING NETCRAFT
  • 24. FINDING EMAIL LIST USING HARVESTER The harvester is a command-line tool included in kali linux that acts as a wrapper for a variety of search engines and is used to find email accounts, subdomain names, virtual hosts, open ports / banners, and employee names related to a domain from different public sources (such as search engines and PGP key servers).