1 00:00:11,280 --> 00:00:19,800 Reconnaissance and footprint think the various pieces of hacking include reconnaissance, scanning, 2 00:00:19,800 --> 00:00:25,050 gaining access, maintaining access and clearing tracks. 3 00:00:25,380 --> 00:00:30,600 The reconnaissance phase is the most important phase of a penetration test. 4 00:00:30,610 --> 00:00:38,520 So this is when the ethical hacker or penetration tester conducts extensive research into gathering 5 00:00:38,520 --> 00:00:41,730 as much information about the target as possible. 6 00:00:41,760 --> 00:00:48,930 Furthermore, foot printing will help create a profile of the target gathering profile information such 7 00:00:48,930 --> 00:00:53,620 as running services, open ports and operating systems. 8 00:00:53,640 --> 00:01:00,180 We will now look at both reconnaissance and food printing in more detail. 9 00:01:02,160 --> 00:01:10,270 From a military perspective, reconnaissance is the observation and research of an enemy target in cybersecurity. 10 00:01:10,290 --> 00:01:16,530 As a penetration tester, we use various tools and techniques to gather detailed information about the 11 00:01:16,530 --> 00:01:20,550 target organization and its underlying infrastructure. 12 00:01:20,910 --> 00:01:24,660 Reconnaissance is a vital in the field of penetration testing. 13 00:01:24,690 --> 00:01:32,310 As a penetration tester, we definitely need to know about our target as well as its vulnerabilities 14 00:01:32,310 --> 00:01:37,890 and operating systems before we attempt to gain access via exploitation. 15 00:01:37,950 --> 00:01:45,030 The information gathered during the reconnaissance phase will help us to choose the right tools and 16 00:01:45,030 --> 00:01:49,260 techniques to successfully exploit the target. 17 00:01:49,530 --> 00:01:58,560 Reconnaissance can be divided into two main categories passive and active. 18 00:01:58,680 --> 00:02:06,840 Passive means users and indirect approach, and does not engage the target. 19 00:02:08,340 --> 00:02:15,480 Active here means directly engages the target to gather specific details. 20 00:02:15,630 --> 00:02:22,740 Next, we will dive into understanding of food printing in ethical hacking. 21 00:02:25,180 --> 00:02:26,440 Footprint thing. 22 00:02:26,830 --> 00:02:34,210 Footprint thing is a procedure whereby as much information as possible is gathered in relation to a 23 00:02:34,210 --> 00:02:34,930 target. 24 00:02:35,960 --> 00:02:37,250 In food printing. 25 00:02:37,250 --> 00:02:46,010 The objective is to obtain specific details about a target such as its operating systems and the service 26 00:02:46,010 --> 00:02:49,100 versions of running applications. 27 00:02:50,160 --> 00:02:57,630 The information that's collected can be used in various ways to gain access to the target system's network 28 00:02:57,630 --> 00:03:00,840 or an organization footprint. 29 00:03:00,840 --> 00:03:08,940 Think allows a penetration tester to understand the security posture of the target infrastructure, 30 00:03:08,940 --> 00:03:15,060 quickly identify security vulnerabilities on the target systems and networks. 31 00:03:15,060 --> 00:03:23,100 And we will it will also help to create a network map of the organization and reduce the layer of focus 32 00:03:23,100 --> 00:03:31,530 to the specific IP addresses, domain names and the types of devices regarding which information is 33 00:03:31,530 --> 00:03:32,490 required. 34 00:03:34,270 --> 00:03:39,310 Food printing is a part of the reconnaissance pace. 35 00:03:39,430 --> 00:03:46,290 However, science foot printing is able to provide more specific details about the target. 36 00:03:46,300 --> 00:03:52,210 We can consider a foot printing to be a subset of a reconnaissance phase. 37 00:03:52,210 --> 00:03:54,520 So there is a diagram. 38 00:03:54,520 --> 00:04:02,110 This shows a visual overview of how reconnaissance and food printing sit together. 39 00:04:02,230 --> 00:04:08,650 So we will also maintain objectives of food printing, where you will learn collecting network information 40 00:04:08,650 --> 00:04:14,530 such as domain names, IP addressing schemes and network protocols. 41 00:04:14,530 --> 00:04:20,920 You will also learn the collecting system information, which is user and group names or routing tables, 42 00:04:20,920 --> 00:04:23,320 system names and types. 43 00:04:23,320 --> 00:04:30,700 You will also learn collecting organization information which is employed, detail company director 44 00:04:30,700 --> 00:04:32,860 and location details. 45 00:04:32,860 --> 00:04:38,080 So to success, fully obtain an information about the target. 46 00:04:38,170 --> 00:04:42,340 I would recommend using the some food printing methodologies. 47 00:04:42,340 --> 00:04:49,900 For example, checking a search engine such as Yahoo Being and Google performing Google hacking techniques, 48 00:04:49,900 --> 00:04:55,540 information gathering through social media platforms such as Facebook, LinkedIn, Instagram and Twitter. 49 00:04:56,170 --> 00:05:03,400 You can also use network food printing techniques, social engineering, perform the dense food printing 50 00:05:03,400 --> 00:05:05,910 use the WHO is command. 51 00:05:05,920 --> 00:05:12,920 You will also perform the email food printing techniques so you are not able to differentiate between 52 00:05:12,940 --> 00:05:15,340 reconnaissance and food printing. 53 00:05:15,340 --> 00:05:21,880 So both reconnaissance and food printing are required during a penetration testing as each provides 54 00:05:21,880 --> 00:05:24,100 a vital information about the target. 55 00:05:24,430 --> 00:05:31,180 In the next section, we will take a deep dive into a passive information gathering.