How to do Footprinting & Reconnaissance as a CEH
- Ethical Hacking
- Project length: 1h 30m
Computer and network security is a complex subject and an ever-moving target. we must stay aware and on top of it so that our information is protected from various attacks. At this point CEH comes into play, we will understand the concepts but we will dig deeper into Practical Approach. Benefit of this course? 1) Increased demand of cyber specialist in IT field as everything is vulnerable in today's era. 2) Protecting yourself from various attacks.
Footprinting & Reconnaissance In this module we will understand how hackers perform footprinting and reconnaissance for gathering information about people, website, network using various tools and techniques.
In this module we will cover the following topics :
- Understanding concepts behind information gathering
- Gathering information using Command prompt utilities
- Gathering information about people
- Gathering information about websites using various techniques
- Extracting information using Google Hacking
- Catching fake emails and tracing back the IP address
- Using Recon-ng tool in Kali for information gathering
- Extracting cookie from a browser