1 00:00:01,120 --> 00:00:08,050 Passive information gathering, beginning a career in ethical hacking and penetration testing can be 2 00:00:08,050 --> 00:00:16,420 very exciting, and most of the time our wines with the bit hover and causing us to visit all the lectures 3 00:00:16,630 --> 00:00:20,470 about explaining a system in a course such as this. 4 00:00:20,920 --> 00:00:27,370 However, when conducting a penetration test is like a starting new project at home before you build 5 00:00:27,370 --> 00:00:28,750 a pool in your backyard. 6 00:00:28,810 --> 00:00:36,040 There are few things you must consider, such as a space that's available the cost of materials, the 7 00:00:36,040 --> 00:00:39,880 contractors, fees and other details. 8 00:00:39,940 --> 00:00:45,700 Information gathering is a very important phase of the hacking lifecycle and penetration testing. 9 00:00:45,940 --> 00:00:52,390 In this lecture, we will focus actually not in this section in this Section 12, but I think four or 10 00:00:52,390 --> 00:00:57,550 five lectures we will focus on passive information gathering techniques and methods. 11 00:00:57,880 --> 00:01:03,760 We will learn how to use the internet to get us the information and specific details we need about our 12 00:01:03,760 --> 00:01:08,560 target by using both online and tools on Linux. 13 00:01:09,040 --> 00:01:13,220 We will look covering in this lecture. 14 00:01:13,240 --> 00:01:18,370 I create Constance and footprinting understanding passive information gathering, understanding open 15 00:01:18,370 --> 00:01:19,450 source intelligence. 16 00:01:19,840 --> 00:01:24,550 Uh, then using the top, we will use Open-Source Intelligence Tools. 17 00:01:24,910 --> 00:01:28,060 Identify the target technologies and security controls. 18 00:01:28,060 --> 00:01:30,250 Finding links in closed resources. 19 00:01:30,430 --> 00:01:33,900 Understanding who is and copying websites with hash city. 20 00:01:33,910 --> 00:01:39,670 Track and find subdomains using soberly staff and other. 21 00:01:40,870 --> 00:01:50,770 Topics we will cover here, so we have some technical requirements in this section of our course here, 22 00:01:50,770 --> 00:01:55,180 the first we need Colin in here, this is the technical requirements. 23 00:01:55,180 --> 00:02:01,170 So it's sort of a day of condiments for to complete this, uh, lecture. 24 00:02:01,300 --> 00:02:10,420 Now this section of our course successful the first unit Lennox, Kali, Linux, Maltego, Richaun Energy. 25 00:02:11,540 --> 00:02:13,950 I like the harvester. 26 00:02:16,210 --> 00:02:19,180 Like, we'll see a framework, we will do all of it. 27 00:02:19,420 --> 00:02:23,440 Uh, frame work here detracts. 28 00:02:26,620 --> 00:02:31,780 Track like, uh, S3 scanner. 29 00:02:33,000 --> 00:02:42,210 And so at least a year, very Constance, and footprinting the various phases of hacking include recon 30 00:02:42,210 --> 00:02:48,780 stands, scanning, gaining access, maintaining access and then clearing tracks, so the reconnaissance 31 00:02:48,780 --> 00:02:52,530 phase is the most important phase of penetration test signs. 32 00:02:52,830 --> 00:02:58,830 This is when the ethical hacker or penetration tester conducts extensive research into gathering as 33 00:02:58,830 --> 00:03:01,350 much information about the target as possible. 34 00:03:01,710 --> 00:03:07,980 Furthermore, footprinting both help create a profile of the target gathering, providing information 35 00:03:08,250 --> 00:03:11,880 such as running services, open ports and operating system. 36 00:03:12,120 --> 00:03:12,780 We will look. 37 00:03:13,200 --> 00:03:20,880 We will now look at both reconnaissance and footprinting in more detail because reconnaissance here. 38 00:03:22,390 --> 00:03:29,380 I reckon it's you from a military perspective, reconnaissance is the observation and research of an 39 00:03:29,380 --> 00:03:35,590 enemy target in cyber security as a penetration testing, the use of various tools and techniques to 40 00:03:35,590 --> 00:03:41,410 gather detailed information about the target organization and its underlying infrastructure. 41 00:03:41,920 --> 00:03:47,350 Reconnaissance is vital in the field of penetration testing as a plantation tester. 42 00:03:47,530 --> 00:03:54,700 We need to know more about our target, as well as its vulnerabilities and operating systems before 43 00:03:54,700 --> 00:03:56,840 we attempt to gain access via exploitation. 44 00:03:56,860 --> 00:04:01,410 Of course, the information gathered at during the reconnaissance is phase. 45 00:04:01,420 --> 00:04:07,330 Will you help us to choose the right tools and techniques to successfully exploit the target? 46 00:04:08,510 --> 00:04:12,550 Uh, reconnaissance can be divided into two categories. 47 00:04:13,120 --> 00:04:16,750 Uh, the first is passive reconnaissance and active. 48 00:04:17,320 --> 00:04:24,520 So Passive Recon stands, uh, using an indirect approach and does not engage to target. 49 00:04:24,880 --> 00:04:31,240 But active reconnaissance is directly engages to the target to gather specific details. 50 00:04:31,900 --> 00:04:37,240 Footprinting we have here, the footprinting is the predator, whereby as much information as possible 51 00:04:37,240 --> 00:04:41,620 is is gathered in relation to target in footprinting. 52 00:04:41,620 --> 00:04:47,960 The objective is to obtain the specific details about the target, such as its operating systems and 53 00:04:48,280 --> 00:04:53,460 service versions of running applications for printing. 54 00:04:54,480 --> 00:05:02,050 So the information that's collected can be used in various ways to gain access to the target system 55 00:05:02,740 --> 00:05:04,450 network or the organization. 56 00:05:04,750 --> 00:05:10,960 Footprinting allows a penetration test there to understand the security posture of the target infrastructure, 57 00:05:11,140 --> 00:05:17,170 quickly identify security vulnerabilities on the target system and networks, and create a network map 58 00:05:17,170 --> 00:05:23,020 of their organization and reduce the area of focus to the specific IP addresses, domain names and the 59 00:05:23,020 --> 00:05:26,890 types of device devices regarding which information is required. 60 00:05:27,520 --> 00:05:30,040 Footprinting is a part of the reconnaissance phase. 61 00:05:30,340 --> 00:05:36,700 All over science footprint is able to provide more specific details about the target we can consider 62 00:05:36,700 --> 00:05:40,000 quote pretending to be a subset of the reconnaissance phase. 63 00:05:41,510 --> 00:05:49,820 So, um, the uh, there are the main objectives of footprinting, the which is collecting collecting 64 00:05:50,030 --> 00:05:59,630 network information in full here like domain names, uh, IP addresses and uh and the network protocols 65 00:05:59,630 --> 00:06:10,360 network protocol senior and uh, second is the collecting system information, uh, collecting, collecting, 66 00:06:10,430 --> 00:06:17,030 think, uh, system information here like user and group. 67 00:06:17,980 --> 00:06:20,710 Names by recruiting table. 68 00:06:21,940 --> 00:06:23,920 Table system names. 69 00:06:26,980 --> 00:06:40,210 Names and times, and lastly, is the collection collecting organization organization information like, 70 00:06:40,210 --> 00:06:44,110 for example, employ include details. 71 00:06:45,200 --> 00:06:57,230 Company director, company directory and location, location, location details to successful obtain 72 00:06:57,230 --> 00:07:03,020 about the target, I will recommend using the footprinting, uh, methodology like that. 73 00:07:03,020 --> 00:07:14,330 For example, checking search engines, check, uh, Yahoo, Bing and Google Perform Pair, uh, form, 74 00:07:14,330 --> 00:07:17,130 Google, uh, hiking and we. 75 00:07:17,480 --> 00:07:26,760 This is not a bad thing, just an advanced Google search technique and an advance of Google search search. 76 00:07:26,900 --> 00:07:27,790 Take me. 77 00:07:38,140 --> 00:07:44,800 Here and now, like in four in four gathering social media. 78 00:07:47,840 --> 00:07:59,360 Uh, Trump, social media like Facebook, uh, LinkedIn, um, for Instagram and Twitter, of course. 79 00:08:02,890 --> 00:08:09,730 And their footprinting, the company's website, so you can, uh, footprint, uh, footprint components 80 00:08:09,740 --> 00:08:10,270 website. 81 00:08:11,630 --> 00:08:16,610 With applications as well, both print, uh, companies. 82 00:08:18,640 --> 00:08:19,300 Website. 83 00:08:22,570 --> 00:08:29,850 You know, perform Emile Footprinting performed Emile Footprinting, food printing techniques. 84 00:08:31,610 --> 00:08:32,990 We will discuss all about. 85 00:08:33,260 --> 00:08:38,210 You will learn how to perform this footprinting the Vatican later. 86 00:08:39,320 --> 00:08:48,950 It is just the introduction course of our section, you'll them, you lose the WHO is command to perform, 87 00:08:49,130 --> 00:09:01,220 perform DNS foot printing and the need for a goes excuse, northrop footprinting tech news and use social 88 00:09:01,370 --> 00:09:02,300 engineering. 89 00:09:02,510 --> 00:09:03,590 The most important? 90 00:09:05,220 --> 00:09:11,040 So you are not able to differentiate between reconnaissance and footprinting, both reconnaissance and 91 00:09:11,040 --> 00:09:17,850 footprinting are required during penetration testing as each provides vital information about the target. 92 00:09:18,260 --> 00:09:24,330 And in this the next hour, we will take a deep dive into passive information gathering.