Learn the concepts, tools, and techniques behind footprinting: ethical hacking techniques for finding information about computers and the people they belong to.
Overview
Syllabus
Introduction
- Scouting the target
- What you should know
- Hacking Ethically
- Footprinting and Reconnaissance
- Using Competitive Intelligence
- Investigating Business Sites
- Searching and Google Hacking
- Employing Social Engineering
- Gathering data on people
- Tracking Online Reputation
- Harvesting Email Addreses
- Examining Websites
- Scraping Websites
- Challenge: Mirroring a website
- Solution: Mirroring a website
- Monitoring websites
- Footprinting using DNS
- Examining a Zone Transfer
- Generating Domain Names
- Determining the Path
- Determining the Path
- Using OSINT Tools
- Investigating Email
- Footprinting VoIP and VPNs
- Going to the Dark Web
- Exploring other footprinting tools
- Conducting a Forensic Exercise
- Examining an email
- Diving into an email header
- Verifying IP blocklists
- Guarding Social Media
- Writing Footprinting Reports
- Countering Footprinting
- Next steps
Taught by
Lisa Bock