Se161148 Lab1 1,2 (2), 4
Se161148 Lab1 1,2 (2), 4
3. Open any web browser (here, Mozilla Firefox) and navigate to https://www.google.com.
Note: If the Default Browser pop-up window appears, check the Don’t show this message again
checkbox and click the Not now button.
1
Lab 1: Perform Footprinting Through Search Engines 2
4. Once the Google search engine appears, you should see a search bar.
5. Type intitle:password site:www.eccouncil.org and press Enter. This search command uses
intitle and site Google advanced operators, which restrict results to pages on the
www.eccouncil.org website that contain the term password in the title. An example is shown
in the screenshot below.
2
Lab 1: Perform Footprinting Through Search Engines 3
6. Now, navigate back to https://www.google.com. In the search bar, type the command EC-
Council filetype:pdf and press Enter to search your results based on the file extension.
7. Now, click on any link from the results (here, first link) to view the pdf file.
8. The page appears displaying the PDF file, as shown in the screenshot.
3
Lab 1: Perform Footprinting Through Search Engines 4
9. Apart from the aforementioned advanced Google operators, you can also use the following to
perform an advanced search to gather more information about the target organization from
publicly available sources.
• cache: This operator allows you to view cached version of the web page.
[cache:www.google.com]- Query returns the cached version of the website www.google.com
• allinurl: This operator restricts results to pages containing all the query terms specified in the
URL.
[allinurl: google career]-Query returns only pages containing the words "google" and "career"
in the URL
4
Lab 1: Perform Footprinting Through Search Engines 5
• inurl: This operator restricts the results to pages containing the word specified in the URL
[inurl:copy site:www.google.com]-Query returns only pages in Google site in which the URL
has the word "copy"
• allintitle: This operator restricts results to pages containing all the query terms specified in the
title.
[allintitle: detect malware]-Query returns only pages containing the words "detect" and
"malware" in the title
5
Lab 1: Perform Footprinting Through Search Engines 6
• inanchor: This operator restricts results to pages containing the query terms specified in the
anchor text on links to the page.
[Anti-virus inanchor:Norton]-Query returns only pages with anchor text on links to the pages
containing the word "Norton" and the page containing the word "Anti-virus"
• allinanchor: This operator restricts results to pages containing all query terms specified in the
anchor text on links to the page.
[allinanchor: best cloud service provider]-Query returns only pages in which the anchor text
on links to the pages contain the words "best," "cloud," "service," and "provider"
6
Lab 1: Perform Footprinting Through Search Engines 7
• link: This operator searches websites or pages that contain links to the specified website or
page.
[link:www.apple.com]-Finds pages that point to Apple's home page
• related: This operator displays websites that are similar or related to the URL specified.
[related:www.youtube.com]-Query provides the Google search engine results page with
websites similar to youtube.com
7
Lab 1: Perform Footprinting Through Search Engines 8
• info: This operator finds information for the specified web page.
[info:fap.fpt.edu.vn] – Query provides information about the FPT University Academic Portal
homepage
8
Lab 2: Perform Footprinting Through Web Services 9
3. Open a web browser (here, Mozilla Firefox), type the URL https://www.netcraft.com in the
address bar, and press Enter. The Netcraft website appears, as shown in the screenshot.
9
Lab 2: Perform Footprinting Through Web Services 10
4. Click the Resources tab from the menu bar and click on the Site Report link under the Tools
section.
5. The What’s that site running? Page appears. To extract information associated with the
organizational website such as infrastructure, technology, used, sub domains, background,
network, etc, type the target website’s URL, (here, https://www.eccouncil.org) in the text field,
and then click the Lookup button, as shown in the screenshot.
10
Lab 2: Perform Footprinting Through Web Services 11
6. The Site report for https://www.eccouncil.org page appears, containing information related
to Background, Network, Hosting History, etc., as shown in the screenshot.
7. In the Network section, click on the website link (here, eccouncil.org) in the Domain field to
view the subdomains
8. The result will display subdomains of the target website along with netblock and operating
system information, as shown in the screenshot.
11
Lab 2: Perform Footprinting Through Web Services 12
9. This concludes the demonstration of finding the company’s domains and sub-domains using
the Netcraft tool.
10. Close all open windows and document all the acquired information.
Task 2.1: Gather Personal Information using PeekYou Online People Search Service
1. In the Windows 10 virtual machine, open any web browser (here, Mozilla Firefox), and
navigate to https://www.peekyou.com
2. In the First Name and Last Name fields, type Satya and Nadella, respectively. In the Location
drop-down box, select Washington DC. Then, click the Search icon.
3. The people search begins, and the best matches for the provided search parameters will be
displayed.
12
Lab 2: Perform Footprinting Through Web Services 13
4. You can futher click on the appropriate result to view the detailed information about the target
person to see a detailed information about the target person.
5. Scroll down to view the entire information about the target person.
6. This concludes the demonstration of gathering personal information using the PeekYou online
people search service.
7. Close all open windows and document all the acquired information.
13
Lab 4: Perform Website Footprinting 14
3. Open the Command Prompt window. Type ping www.certifiedhacker.com and press Enter to
find its IP address. the displayed response should be similar to the one shown in the screenshot.
4. Note the target domain’s IP address in the result above (here, 162.241.216.11). You can obtain
information on Ping Statistics such as packets sent, packets lost, and approximate round-trip
time.
14
Lab 4: Perform Website Footprinting 15
5. In the Command Prompt window, type ping www.certifiedhacker.com -f -l 1500 and press
Enter.
6. The response, Packet needs to be fragmented but DF set, means that the frame is too large to
be on the network and needs to be fragmented. The packet was not sent as we used the -f switch
with the ping command, and the ping command returned this error.
7. In the Command Prompt window, type ping www.certifiedhacker.com -f -l 1300 and press
Enter.
8. Obseve that the maximum packet size is less than 1500 bytes and more than 1300 bytes.
15
Lab 4: Perform Website Footprinting 16
9. Now, try different values until you find the maximum frame size. For instance, ping
www.certifiedhacker.com -f -l 1473 replies with Packet needs to be fragmented but DF set,
and ping www.certifiedhacker.com -f -l 1372 replies with a successful ping. It indicates that
1372 bytes are the maximum frame size on this machine’s network
10. Now, discover what happens when TTL (Time to Live) expires. Every frame on the network
has TTL defined. If TTL reaches 0, the router discards the packet. This mechanism prevents the
loss of packets.
11. In Command Prompt, type ping www.certifiedhacker.com -i 1 and press Enter. This option
sets the time to live (-i) value as 1.
16
Lab 4: Perform Website Footprinting 17
12. Reply from 192.168.213.2: TTL expired in transit means that the router (192.168.213.2)
discarded the frame because its TTL has expired (reached 0)
13. Minimize the command prompt shown above and launch a new command prompt. Type ping
www.certifiedhacker.com -i 1 -n 1 and press Enter. Here, we set the TTL value to 1 and the -
n value to 1 to check the life span of the packet.
Note: -n specifies the number of echo requests to be sent to the target.
15. Observe that there is a reply coming from the IP address 162.214.216.11, and there is no packet
loss.
16. Now, change the time to live value to 4 by typing ping www.certifiedhacker.com -i 4 -n 1 and
press Enter.
17
Lab 4: Perform Website Footprinting 18
17. Repeat the above step until you reach the IP address for www.certifiedhacker.com (in this case
162.241.216.11)
18. Here, the successful ping to reach www.certifiedhacker.com is 19 hops
19. This implies that, at a time to live value of 19, the reply is received from the destination host
(162.241.216.11)
20. The concludes the demonstration of gathering information about a target website using Ping
command-line ultility (such as the IP address of the target website, hp count to the target, and
value of maximum frame size allowed on the target network).
21. Close all open windows and document all the acquired information.
18