What is Pentesting?
In this section I will try to define some terms (without reinventing the wheel) that I came across during my studies on Pentesting using references from widely recognized brands and companies.
In this section I will try to define some terms (without reinventing the wheel) that I came across during my studies on Pentesting using references from widely recognized brands and companies.
My resume of module 02 footprinting form CEH material
Level: easy
In the official gluide of CEH the tool used for search subdomains is sublist3r, but extist some great tools for complement this fase of footprinting here a list:
Online tools
to search domains based on CA Certificate Transparency, like also:
https://certificate.transparency.dev/
https://transparencyreport.google.com/https/certificates
for advanced queries in crt.sh check here https://www.randori.com/enumerating-subdomains-with-crt-sh/
My resume of module 02 footprinting form CEH material
Level: ultra easy
To get max frame size using ping command:
On Windows
|
|
Where:
On Linux
|
|
Where:
On Windows is needed specify that frames are fragmented (-f)
My resume of module 02 footprinting form CEH material
So far, we have discussed the necessary techniques and tools that can be used to footprint a target organization’s network. Penetration testing (or pen testing) refers to the process of testing the organization’s security posture using similar techniques and tools as that of an attacker, but with the knowledge and approval of the organization. Footprinting is the first step to perform in the pen testing process. Performing footprinting in a systematic manner enables a pen tester to discover potential security liabilities that an attacker may exploit. In the pen testing process, the pen tester acts as a malicious outsider and simulates an attack to find security loopholes.
My resume of module 02 footprinting form CEH material
So far, we have discussed the importance of footprinting, various ways to perform the task, and the tools that help to conduct execution. Now we will discuss footprinting countermeasures, the measures or actions taken to prevent or offset information disclosure.
Some of the footprinting countermeasures are as follows:
My resume of module 02 footprinting form CEH material
So far, we have discussed the different techniques for gathering information either with the help of online resources or tools. Now we will discuss footprinting through social engineering, the art of obtaining information from people by manipulating them. This section covers the concept as well as the techniques used to gather information.
Social engineering is a totally non-technical process in which an attacker misleds a person into providing confidential information unknowingly. In other words, the target is unaware of the fact that someone is stealing confidential information. The attacker takes advantage of the helpful nature of people and their willingness to provide confidential information.