1 Footprinting
Website Footprinting
HTTrack
mirror websites. More at https://en.kali.tools/?p=443
Install on debian unix like kali:
$ apt-get install httrack webhttrack
$ webhttrack
Use the webhttrack GUI which is a browser GUI and you can select the options via your browser or the wizard for options:
$ webhttrack www.mysite.com --mirror-wizard
The website should be copied into the default folder if not specified: home/username/websites/TheCopiedWebsite
$ sudo cp -r TheCopiedWebsite /var/www/html
Then start your local apache web server
$ service apache2 status
$ service apache2 start
Then open localhost/TheCopiedWebsite in your browser to explore the copied website.
BurbSuite
TBD
Owasp Zap
TBD
Firebug
TBD
Online Tools
Shodun
Explore the internet of things. Free account has a limited quantity of searches per day. Find exploits and targets.
Basic commands:
Look for vulnerable HTTP Website hosted with Apache servers in your city, i.e.:
apache country="FR" city:"chamonix" port:"80"
Look for google web server i.e.:
"Server: gws" hostname:"google"
Look for subnet devices i.e.:
cisco net "80:332:11:10/24"
Exploit Database
``` https://www.exploit-db.com/google-hacking-database
DNS footprinting
What Information can we fing in the DNS records? Depends on the country.
SVR= Service location records
PTR= Pointer records
RP= Responsible Person record (not in Switzerland)
HInfo=Host Information

Last updated