1 00:00:08,270 --> 00:00:12,230 Let us start with practicals of application and testing. 2 00:00:13,250 --> 00:00:20,450 In the spectacle, it is the first spectacle they will carry out website footprinting using who is believed 3 00:00:20,450 --> 00:00:21,530 and crunchiness. 4 00:00:22,680 --> 00:00:25,140 I don't to Google and type who is? 5 00:00:28,130 --> 00:00:31,520 The first link, which you can see open that link. 6 00:00:32,940 --> 00:00:38,940 Who is is a query and response protocol, it is a widely used for creating databases that store the 7 00:00:38,940 --> 00:00:46,230 registered users or a sense of an Internet resource such as domain name, IP address, autonomous system, 8 00:00:46,530 --> 00:00:53,150 but is also used for a wide range of other information, the protocols, tools and delivers data content 9 00:00:53,160 --> 00:00:54,490 in a human readable format. 10 00:00:55,440 --> 00:01:01,380 The current iteration of the Who is protocol was drafted by the Internet society and it documented in 11 00:01:01,380 --> 00:01:03,330 our three nine one two. 12 00:01:04,600 --> 00:01:09,520 So in the search bar type, certified hacker dot com. 13 00:01:10,920 --> 00:01:16,110 Remember here we have typed the domain name, so don't include w w w. 14 00:01:17,460 --> 00:01:23,520 Bullah, we can see a lot of information on whether this is the same information you can gather using 15 00:01:23,520 --> 00:01:26,280 multicore and other information gathering tools. 16 00:01:34,640 --> 00:01:37,070 Now, let's type build with. 17 00:01:42,040 --> 00:01:48,940 You can see the first link over there, let's open that link built with is an Internet service company 18 00:01:49,180 --> 00:01:50,840 based mainly in Australia. 19 00:01:51,610 --> 00:01:54,280 It was launched in August 2007. 20 00:01:54,970 --> 00:02:01,120 The goal of building it is to help developers, researchers and designers track what technologies are 21 00:02:01,120 --> 00:02:07,130 being used, but other websites which may help them to decide what technologies to implement by themselves. 22 00:02:07,480 --> 00:02:10,540 So let us type certified hacker or call. 23 00:02:16,870 --> 00:02:22,750 Yes, you've got the information like you can see the subversive language jiggery. 24 00:02:25,030 --> 00:02:32,110 Can scan through the results, the posting on providers are blowholes unify the SSL certificate issued 25 00:02:32,110 --> 00:02:40,030 by Lix and Google issued the SSL certificates via a free platform called Alerts and to each and every 26 00:02:40,030 --> 00:02:40,540 Web site. 27 00:02:45,110 --> 00:02:51,470 When you go into detail technology profile, you can see the framework's user is better net than the 28 00:02:51,470 --> 00:02:53,410 Java libraries and functions. 29 00:02:53,990 --> 00:02:58,880 You can scroll down and then you can see the effect of clicks and encrypt. 30 00:03:00,600 --> 00:03:07,140 You can see the Web services of the Apache engines, I said, and you can scan through all the taps 31 00:03:07,140 --> 00:03:13,050 using it now, we will gather the information about the website using cannabis. 32 00:03:17,490 --> 00:03:18,510 This click, that link. 33 00:03:20,190 --> 00:03:25,950 Karen Bass is the leading platform for professionals who discover innovative companies, connect with 34 00:03:25,950 --> 00:03:28,710 the people behind them and pursue new opportunities. 35 00:03:29,200 --> 00:03:35,880 Over 55 million professionals, including entrepreneurs, investors, market researchers and salespeople, 36 00:03:36,510 --> 00:03:39,660 trust GreenSpace to inform their business decisions. 37 00:03:40,230 --> 00:03:46,470 And companies all over the world rely on graduates to power their applications, making over a billion 38 00:03:46,470 --> 00:03:49,220 calls to the EPA each year. 39 00:03:50,160 --> 00:03:57,700 Now, suppose you are a protester and Amazon has asked you to carry out a black box listing on the website. 40 00:03:58,200 --> 00:04:05,040 Now, you know, Amazon.com is the most secure website, so using GreenSpace, you will find various 41 00:04:05,040 --> 00:04:07,080 acquisitions, halwa, Amazon. 42 00:04:07,890 --> 00:04:10,680 Now, type in the search bar, Amazon. 43 00:04:15,770 --> 00:04:17,710 The on organization Amazon. 44 00:04:19,220 --> 00:04:26,310 You can see a number of acquisitions, Eighty-seven number of investments, 90 GreenSpace is a big tool, 45 00:04:26,660 --> 00:04:32,510 but in the free version we can see a limited amount of data which can also be useful for information 46 00:04:32,510 --> 00:04:32,870 gathering. 47 00:04:33,500 --> 00:04:35,720 Now let us click on Zook's. 48 00:04:36,960 --> 00:04:40,920 We will head to page one, where we will get information about Zook's. 49 00:04:42,800 --> 00:04:48,050 Looks like Amazon, the total funding of mine, 55 million. 50 00:04:49,410 --> 00:04:56,640 You can get the website link over there, and if you find vulnerabilities in that website and that website 51 00:04:56,640 --> 00:05:02,160 is acquisition of Amazon, that is, you are successful in carrying out testing on Amazon's website. 52 00:05:03,450 --> 00:05:05,820 You can scan to multiple taps over there. 53 00:05:06,630 --> 00:05:12,360 This is how you can scan through multiple websites and find the related information that you want to 54 00:05:12,360 --> 00:05:12,630 do. 55 00:05:12,630 --> 00:05:20,280 A test in the next lecture will gather information about some websites using Web Archive and DNS Dumpster.