0% found this document useful (0 votes)
26 views4 pages

Lab Session 4-A

This lab session focuses on passive reconnaissance in ethical hacking, teaching students to gather publicly available information about targets using tools like Google advanced search operators and Whois lookup. Students will document key details such as IP addresses and registrar information for specified websites, enhancing their understanding of the reconnaissance phase before penetration testing. Ethical considerations are emphasized, ensuring that all information gathering remains legal and within ethical boundaries.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views4 pages

Lab Session 4-A

This lab session focuses on passive reconnaissance in ethical hacking, teaching students to gather publicly available information about targets using tools like Google advanced search operators and Whois lookup. Students will document key details such as IP addresses and registrar information for specified websites, enhancing their understanding of the reconnaissance phase before penetration testing. Ethical considerations are emphasized, ensuring that all information gathering remains legal and within ethical boundaries.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Bachelor of Information Communications Technology

Bahrain Polytechnic

Introduction to Information
Security
Lab Session 4a
Bachelor of Information Communications Technology

Introduction:

This lab focuses on the passive reconnaissance phase of ethical hacking, where the goal is to gather
publicly available information about potential targets without actively probing or interacting with
the systems. In this exercise, you will use Google advanced search operators and various Whois
lookup tools to collect key details such as IP addresses, registered owners, and contact details for
well-known websites. This phase is critical in understanding the footprint of your target before
moving to more active penetration testing.

Learning Outcomes Assessed:

The following learning outcomes are being assessed in this lab session:

1. Perform and report upon an ethical penetration test, focusing on passive reconnaissance
techniques.

Lab 4a - Description:

In this lab, you will use various tools like Google (advanced search operators), number registries
(ARIN, RIPE), and other websites (e.g., network-tools.com, domaintools.com) to gather
information about potential targets. This will give you hands-on experience in passive
reconnaissance, a critical first step in any penetration test.

The targets for this lab are the following websites:

1. www.google.com
2. www.wikipedia.org
3. www.facebook.com
4. www.coursera.org

For each target, gather and document the following information:

• IP address
• Registered location
• Registrar's name and address
• Registrar's contact number (if available)

How to Use the Tools:

Here are some tools and techniques you can use for information gathering:
Bachelor of Information Communications Technology

• Google Advanced Search Operators: Use operators like site:, inurl:, filetype: to
refine your searches.
• Whois Lookup: Use websites like whois.domaintools.com or network-tools.com to
find detailed information about domains.
• IP Number Registries: Use registries like ARIN (American Registry for Internet
Numbers) and RIPE (Réseaux IP Européens) for IP address lookups.

Documentation:

You should record your findings in a Word-processed document (e.g., MS Word). For each
target, clearly document the IP address, registered location, registrar's name, and contact
information.

Additionally, document the tools and techniques used to gather each piece of information. This
can include details like which Google operators were used and why, or the specific Whois tool
employed.

Analysis of Gathered Information:

Once you have gathered the required information, analyze its importance in the context of ethical
hacking. Consider questions like:

• How can the information collected be used in a penetration test?


• What vulnerabilities or weaknesses might be inferred from the publicly available data?
• How could this information be exploited by malicious actors?

Write a brief reflection on how this information could be valuable to attackers and how
organizations can mitigate these risks.

Ethical Considerations:

As an ethical hacker, it is important to remain within legal and ethical boundaries when gathering
information. Ensure that you are not attempting to bypass security controls or conduct
unauthorized scans or tests on live systems.

Optional Submission:
Bachelor of Information Communications Technology

Although submission is not required for this lab, you are encouraged to submit your findings for
feedback. Focus on accuracy and thoroughness in your documentation and analysis.

You might also like