Footprinting & Reconnaissance
Footprinting and reconnaissance are the first and most critical phases of ethical hacking, where security professionals gather intelligence about a target before launching any attack simulation. This section covers passive and active reconnaissance techniques including domain analysis, WHOIS lookup, DNS enumeration, social media intelligence, and public data mining. You’ll learn how ethical hackers use reconnaissance tools to map attack surfaces, identify entry points, and collect valuable system information. Step-by-step tutorials, tool guides, and lab demonstrations will help you master information gathering legally and effectively.
33 articles
Network Scanning Tutorial Using Nmap Day 7 — Stealth Scanning, IDS Evasion & Red Team Techniques
Network Scanning Tutorial Using Nmap Day 7 - Learn stealth scanning, IDS evasion, and advanced Red Team Nmap techniques used…
Network Scanning Tutorial Using Nmap Day 6— Nmap Scripting Engine (NSE) & Vulnerability Discovery
Network Scanning Tutorial Using Nmap Day 6 - Learn Nmap Scripting Engine (NSE) for vulnerability discovery and automated reconnaissance. Day…
Information Gathering Using Kali Linux Day 7: Directory Discovery with Dirsearch
Information Gathering Using Kali Linux Day 7 - Learn Information Gathering using Kali Linux with Dirsearch step-by-step. Discover hidden directories…
Amass Tutorial (2026): Powerful Subdomain Enumeration Guide for Kali Linux
Learn Amass tutorial for subdomain enumeration and reconnaissance in Kali Linux. Step-by-step ethical hacking guide used by penetration testers and…
Information Gathering Using Kali Linux Day 6: Technology Fingerprinting with WhatWeb
Information Gathering Using Kali Linux Day 6 - Learn Information Gathering using Kali Linux with WhatWeb step-by-step. Detect website technologies,…
Network Scanning Tutorial Using Nmap Day 5— OS Detection & Network Fingerprinting (Professional Level)
Network Scanning Tutorial Using Nmap Day 5 - Learn operating system detection and network fingerprinting using Nmap like professional penetration…