Objectives:
- The objective of the lab is to extract information about the target using web applications and tools.
- Including:
- Organization Network Information (Employee details, partner details, weblinks, web technologies, patents, trademarks, etc.)
- Network Information (Domains, sub-domains, network blocks, network topologies, trusted routers, firewalls, IP addresses of the reachable systems, the Whois record, DNS records, and other related information)
- System Information (Operating systems, web server OSes, user accounts and passwords, etc.)
Machines Used:
- Windows 10
- Linux Parrot OS
Applications/Tools/Services/Methods Overview
- Web Service Footprinting
- netcraft.com
- People Searches
- theHarvester
- Dark Web Searches (Tor)
- censys.com
- Social Network Footprinting
- theHarvester [Parrot]
- Sherlock [Parrot]
- followerwonk.com
- Website Footprinting
- ping (Command Line ICMP)
- website.informer.com
- Web Data Extractor
- HTTrack Website Copier
- CeWL [Parrot]
- Email Footprinting
- Whois Footprinting
- DNS Footprinting
- nslookup
- yougetsignal.com
- Dnsrecon [Parrot]
- Network Fingerprinting
- arin.net
- traceroute/tracert
- Fingerprinting tools
- Recon-ng
- Maltego
- OSRFramework
- BillCipher
- OSINT Framework
Detailed Application/Tool/Service Information
Category: Web Services
Name: https://www.netcraft.com
Objective: Find a companies sub domains
Function: The website has a search function that allows you to get detailed site information, and subdomain information on a target. (Resources>Site Report)
Similar tools: Sublist3r, Pentest-Tools Find Subdomains
Results: Site mappings, common names, subdomain, site information
Precautions: Search site may be a watering hole. Any subdomains could be malicious
Countermeasures/Mitigation: Request the removal of this information if it is public.
Name: https://www.peekyou.com
Objective: Get detailed information on a human target
Function: Enter known information to search public databases for names, addresses, contact details, DoB, photos, videos, profession, income, family, social media profiles, background checks.
Similar Websites: pipl.com | intelius.com | beenverified.com
Results: Detailed information on a target
Precautions: Invasion of privacy, some people may feel this is unethical
Countermeasures/Mitigation: Leave a small digital footprint in terms of what you share. Use a fake name where possible. Don’t use social media. Use Mike Bazzells worksheet to delete a lot of personal information.
Name: theHarvester
Objective: Gather an email list.
Function: This tool gathers emails, subdomains, hosts, employee names, open ports, and banners from different public sources such as search engines, PGP key servers, and databases. It is found pre-installed on common penetration testing Linux distributions like Parrot and Kali.
Commands and Options:

Results: The scan will build and list a table based on the options and target selected.
Precautions: Verify that every network you touch with this tool is in the scope of the engagement.
Countermeasures/Mitigation: Try to use unconventional name schemas to make it more difficult to scrape.
Name: Tor
Objective: Gather Information on the Deep/Dark Web.
Function: Tor operates outside of the world wide web and is only accessible through the Tor browser. Users on the browser are “anonymous” and have access to sites like the Hidden Wikki, FakeID, and The Paypal Cent.
Similar Tools: Exonera Tor | OnionLand Search Engine
Results: Sites offering illegal services are found.
Precautions: Using Tor legal but it does host illegal content.
Countermeasures/Mitigation: Protect your identity so that it does not end up for sale on the dark web. You can use dark web searches to check for data breaches before they might be known to the general public. Some tools for sale might offer insight as to what hacking techniques are in vogue.
Name: https://www.censys.com
Objective: Determine Target OS Through Passive Footprinting
Function: Enter a website into the search engine to get the Operating System of the server without letting the company know you are probing the network.
Similar Sites: netcraft.com | shodan.io
Results: Basic information can be attained like OS, Protocols, What the server is running.
Precautions: Not many, it is a passive recon using public information. Be careful of links.
Countermeasures/Mitigation: Ensure the ports on your network that do face the internet are secure. Be aware that the information is out there. Use obfuscation techniques to mask your OS, but remember obfuscation is not security.
Category : Social Network Footprinting
Name: theHarvseter
Objective: Gather Employees information from Linked in with theHarvester
Function: This tool gathers emails, subdomains, hosts, employee names, open ports, and banners from different public sources such as search engines, PGP key servers, and databases. It is found pre-installed on common penetration testing Linux distributions like Parrot and Kali.
Commands and Options: Use the man page from earlier to specify the target and database.
- -d (Domain)
- -l (Limit Results)
- -b (Data Source)
- Ex: root@parrot[~]#theHarvester -d eccouncil -l 200 -b linkedin
Results: A list of names and their individual role in the company
Precautions: Verify that every network you touch with this tool is in the scope of the engagement.
Countermeasures/Mitigation: Be aware that LinkedIN is a publicly available social media platform and is a high target for reconnaissance.
Name: Sherlock
Objective: Gather personal information from various social networking sites.
Function: Sherlock is a tool written in python that is used to gather information on a target over various social networking sites.
Commands and Options:

Results: The output displays a list of associated sites and a URL that is attached to the searched target.
Other Tools: Social Searcher | UserRecon
Precautions: Ensure you have permission to search the individual, it is unethical to search without someone’s knowledge and permission.
Countermeasures/Mitigation: Leave a small digital footprint in terms of what you share. Use a fake name where possible. Don’t use social media. Use Mike Bazzells worksheet to delete a lot of personal information.
Name: https://www.followerwonk.com
Objective: Gather Information Using Followerwonk
Function: It is a tool to gather information about Twitter followers. It provides where they are, what they Tweet and can perform an analytical assessment on them.
Similar Sites: hootsuite.com | sysomos.com
Results: Can provide good information on the posture and attitude of a company.
Precautions: None really, it is using public non-invasive methods.
Countermeasures/Mitigation: Be aware of the consequences of following Twitter users and liking Tweets.
Category: Website Footprinting
Name: ping
Objective: Gather Information About a Target Website Using Ping
Function: You can determine if a host is up by using the ping command line utility. Ping statistics can provide more insight as to how many hops away a target is, the largest packet that they accept, verification of an IP address.
Commands and Options:

Results: Able to identify that the host on the network is up and how close it is.
Precautions: Ensure you have permission to test the network, if any disruptions happen you may be legally prosecuted.
Countermeasures/Mitigation: Disable ICMP on hosts in a network that do not need it.
Name: https://website.informer.com
Objective: Gather Information About a Target Website Using Website Informer
Function: An online tool that gathers information such as a website’s traffic rank, daily visitors, page views, DNS servers, Whois records.
Similar Tools: Burp Suite | Zaproxy
Results: Provides good information about who created the site, when it expires, the Hosting Company, Registrar, IPs, DNS, and associated email addresses.
Precautions: As usual be cautious of links, the information provided may be intentionally misleading.
Countermeasures/Mitigation: Disclose as little information as possible when creating a website.
Name: Web Data Extractor
Objective: Extract a Company’s Data Using Web Data Extractor.
Function: Use the tool to extract data information like Session, Meta tags, emails, phone numbers, URLs and store it in an offline easy to read format.
Guide for Usage:
- After installation, launch Web Data Extractor from Desktop.
- The Web Data Extractor main window appears. Click New to start a new session.
- The Session settings window appears; type a URL (here, http://www.certifiedhacker.com) in the Starting URL field. Check all the options, as shown in the screenshot, and click OK.
- Click Start to initiate the data extraction.
- Web Data Extractor will start collecting information (Session, Meta tags, Emails, Phones, Faxes, Merged list, URLs, and Inactive sites).
- Once the data extraction process is completed, an Information dialog box appears; click OK.
- View the extracted information by clicking the tabs.
- Select the Meta tags tab to view the URL, Title, Keywords, Description, Host, Domain, page size, etc.
- Select the Emails tab to view information related to emails such as Email address, Name, URL, Title, etc.
- Select the Phones tab to view the Phone, Source, Tag, URL, etc.
- Check for more information under the Faxes, Merged list, URLs, and Inactive sites tabs.
- To save the session, choose File and click Save session.
- Specify the session name (here, certifiedhacker.com) in the Save session dialog box and click OK.
- Click the Meta tags tab, and then click the floppy icon.
- An Information pop-up may appear with the message You cannot save more than 10 records in Demo Version; click OK.
- The Save Meta tags window appears. In the File name field, click on the folder icon, select the location where you want to save the file, choose File format, and click Save.
Similar Spiders: ParseHub | SpiderFoot
Results: A nice searchable file with site information that is organized.
Precautions: Ensure you have permission to use this tool it may slow down or break the web server.
Countermeasures/Mitigation: Do not allow sensitive data on your website even for a second because someone could use a tool like this and keep it forever.
Name: HTTrack Web Site Copier
Objective: Mirror a website to fingerprint it thoroughly.
Function: Allows you download it locally so you can access and analyze all directories, HTML, images, and any files.
Guide for Usage:
- Launch HTTrack
- The WinHTTrack Website Copier window appears. Click OK in the pop-up window, and then click Next > to create a New Project.
- Enter the name of the project (here, Test Project) in the New project name: field. Select the Base path: to store the copied files; click Next >.
- Enter a target URL (here, http://www.certifiedhacker.com) in the Web Addresses: (URL) field and click Set options….
- WinHTTrack window appears, click the Scan Rules tab and select the checkboxes for the file types as shown in the following screenshot; click OK.
- Click the Next > button.
- By default, the radio button will be selected for Please adjust connection parameters if necessary, then press FINISH to launch the mirroring operation. Check Disconnect when finished and click Finish to start mirroring the website.
- Once the site mirroring is completed, WinHTTrack displays the message Mirroring operation complete; click on Browse Mirrored Website.
Similar Tools: NCollector Studio | Cyotek WebCopy
Results: You can now test anything you need without damaging the integrity of the site. Be aware any changes to the site made after you mirror it will not copy over.
Precautions: Ensure you have permission.
Countermeasures/Mitigation: Understand that attackers are going to have plenty of time to find a way in and may not alert you when they do. Perform annual penetration tests.
Name: CeWL
Objective: Gather a wordlist from the Target Website Using CeWL.
Function: CeWL can use a spider to crawl a website and put together a list so you can craft a specific attack using known information.
Commands and Options:

Results: A unique wordlist from the target website is created. (can be directly written to a file with the -w flag)
Precautions: Entering a password to login as someone other than yourself without permission is illegal.
Countermeasures/Mitigation: Use complex passwords and non specific usernames.
Category eMail Footprinting
Name: eMailTrackerPro
Objective: Gather Information about a Target by Tracing Emails using eMailTrackerPro
Function: Use email headers to gather details of the sender, routing information, addressing scheme, date, subject, and recipient.
Guide for Usage:
- launch the eMailTrackerPro.
- To trace email headers, click the My Trace Reports icon from the View section.
- Click the Trace Headers icon from the New Email Trace section to start the trace.
- A pop-up window will appear; select Trace an email I have received. Copy the email header from the suspicious email you wish to trace and paste it in the Email headers: field under Enter Details section.
- For finding email headers, open any web browser and log in to any email account of your choice; from the email inbox, open the message you would like to view headers for.
- Copy the entire email header text and paste it into the Email headers: field of eMailTrackerPro, and click Trace.
- The My Trace Reports window opens.
- The email location will be traced in a Map (world map GUI). You can also view the summary by selecting Email Summary on the right-hand side of the window. The Table section right below the Map shows the entire hop in the route, with the IP and suspected locations for each hop.
- To examine the report, click the View Report button above Map to view the complete trace report.
- The complete report appears in the default browser.
Similar Tools: Infoga | Mailtrack
Results: Gather good information on a target’s location, activity, contact information.
Precautions: Ensure you have permission to use this tool against a target, some information may be confidential.
Countermeasures/Mitigation: Use an email service that offers end to end encryption. Use email filtering to filter suspicious emails. Educate employees to not open suspicious emails.
Category: Whois Footprinting
Name: https://whois.domaintools.com
Objective: Perform whois lookup with domain tools
Function: Use the website search tool to get information about a specific domain. Including information about the registrant, country, dates, name servers, IP addresses, history, and status.
Similar Sites: SmartWhois | Batch IP Converter
Results: Good information if you need to know details about the owner of a site, easy to use.
Precautions: None
Countermeasures/Mitigation: Use a fake name when registering a website, keep up to date with when your domain expires.
Category: DNS Footprinting
Name: nslookup
Objective: Gather DNS information using nslookup command line utility and online tool, Perform reverse DNS lookup using reverse IP domain check and DNSRecon.
Function: nslookup is a command-line utility that can be used to query the DNS server to obtain a domain name or IP address mapping.
Commands and Options:
- $ nslookup
- brings the interactive mode
- $ > <domain>
- query dns server for domain
- $ > <ip_address>
- $ > server <ip_address or domain>
- change the default (current) DNS server to ip_address or domain
- $ > set root=dnsserver
- makes the root DNS server the default DNS server for the query session
- $ > domain dnssever
- show the IP address of the host domain, but query dnsserver for the information
- $ > set type=x
- determines the type of DNS record that the DNS server will use to answer the query (x = DNS record type)
- $ > set recursive
- query other DNS servers if the default server does not have the information
- $ > ls -a domain
- list all canonical (true) names and aliases in domain
- $ > ls -h domain
- list HINFO (CPU type and operating system) for domain
- $ > ls -s domain
- list the well-known services available on domain
- $ > ls -d domain
- list all available records for the domain. Includes all DNS record types
- $ > ls -t [type] domain
- list all DNS TYPE records for the domain
- $ > exit
- quit the interactive mode
Results: Use nslookup to get information about a DNS server, by pretending to be another site you can get the authoritative name server to focus your attention on.
Precautions: Setting your DNS server manually can result in connecting to a compromised server.
Countermeasures/Mitigation: Do not allow unsolicited DNS responses. Do not allow queries that are very close together. Drop unsolicited queries. Force the DNS server to prove it is not spoofed. Use ACL’s.
Name: DNSRecon
Objective: Perform Reverse DNS Lookup using Reverse IP Domain Check and DNSRecon.
Function: Use yougetsignal.com to perform a reverse lookup and get the domain IP address that can be used with dnsrecon. Then use dnsrecon to locate a PTR record for those IP addresses.
Commands and Options:

Results: The output of the search matches an ip address to a domain name to verify any domains that might be on a subnet.
Precautions: Ensure you have permission.
Countermeasures/Mitigation: Do not allow unsolicited DNS responses. Do not allow queries that are very close together. Drop unsolicited queries. Force the DNS server to prove it is not spoofed. Use ACL’s.
Category: Network Footprinting
Name: https://arin.net/about/welcome/region
Objective: Locate a Network Range
Function: Use the website tool to enter an IP address of a target organization.
Results: You will get information about the network range, type, and registration information.
Precautions: None
Countermeasures/Mitigation: You will show up on this database if you register the IP.
Name: tracert/traceroute
Objective: Perform Network Tracerouting in Windows and Linux Machines.
Function: Identify the path and hosts between the source and destination. Get IP addresses to map the network topology of the organization. Extract information about the network topology, trusted routers, firewall locations.
Commands and Options:


Results: A good map of a network with verified hosts along the way
Precautions: Permission required to use. Proxies may hide or obfuscate the true network.
Similar Tools: VisualRoute | Traceroute NG (RIP SolarWinds)
Countermeasures/Mitigation: Block any incoming internal traffic that is attempting to map the network by blocking ports, using proxy servers, or using ACLs.
Personal Reflection:
The standout tools here are theHarvester, sherlock, dnsrecon and CeWL. The rest of the examples are good resources to go to, however they could be summarised with links and descriptions rather than complete lab sections. I think a fun exercise could be to select a target domain or person and have a group separately gather as much information as possible within a given time. What these labs show is how open we all are to having our personal information readily available. Not only can this apply to our personal lives but also to the companies we work for. Social profiles combined with network recon allows attackers to craft very specific attacks that can be designed to slip past threat detection. This can come in the form of impersonating an employee at a company, or you could social engineer a person at the company if you manipulated them using their social profile. Taking all of this into account to prevent this you could hire someone to map your company as if they were a threat actor to help build a better defense.
Works Cited:
EC-Council. Certified Ethical Hacker (CEH) Version 11 eBook w/ iLabs (Volumes 1 through 4). International Council of E-Commerce Consultants (EC Council), 2020. [VitalSource Bookshelf].