This module of the Certified Ethical Hacker (CEH) certification focuses on the crucial initial steps an attacker (or ethical hacker) takes to gather information about a target. This process is divided into two main parts:
- Footprinting: This involves passively gathering information about the target without directly interacting with their systems. Think of it as reconnaissance from a distance.
- Reconnaissance: This involves more active techniques that may involve some interaction with the target’s systems, though still generally in a non-intrusive manner.
Key Concepts Covered in this Module:
- Footprinting Methodology: This includes various techniques like:
- Using search engines: Advanced Google searches (Google dorking) to find sensitive information exposed online.
- WHOIS lookups: Retrieving domain registration information to identify owners, contacts, and other details.
- DNS interrogation: Gathering information about domain name servers, IP addresses, and subdomains.
- Social media reconnaissance: Analyzing social media profiles of individuals and organizations to gather insights.
- Website analysis: Examining website code, headers, and content to uncover technologies used and potential vulnerabilities.
- Reconnaissance Techniques: This includes techniques like:
- Network scanning: Using tools like Nmap to identify active hosts, open ports, and services running on a target network.
- Tracerouting: Mapping the network path to a target to understand network infrastructure.
- Social engineering: Manipulating individuals to divulge confidential information (though this is covered in more detail in later modules).
- Footprinting and Reconnaissance Tools: The module covers various tools used for information gathering, such as:
- WHOIS lookup tools
- DNS analysis tools (e.g., nslookup, dig)
- Network scanners (e.g., Nmap)
- Website analysis tools (e.g., Nikto)
- Countermeasures: The module also discusses countermeasures that organizations can implement to protect against footprinting and reconnaissance activities.
Why is Footprinting and Reconnaissance Important?
- For Attackers: It helps them understand the target’s infrastructure, identify potential vulnerabilities, and plan their attack strategy.
- For Ethical Hackers: It helps them assess the organization’s security posture, identify information leakage, and recommend appropriate security measures.