Footprinting & Reconnaissance
Footprinting and reconnaissance are the first and most critical phases of ethical hacking, where security professionals gather intelligence about a target before launching any attack simulation. This section covers passive and active reconnaissance techniques including domain analysis, WHOIS lookup, DNS enumeration, social media intelligence, and public data mining. You’ll learn how ethical hackers use reconnaissance tools to map attack surfaces, identify entry points, and collect valuable system information. Step-by-step tutorials, tool guides, and lab demonstrations will help you master information gathering legally and effectively.
33 articles
Network Scanning Tutorial Using Nmap Day 4 — Service & Version Enumeration
Network Scanning Tutorial Using Nmap Day 4 - Learn service and version enumeration using Nmap like professional penetration testers. Day…
Hacker Recon Checklist: 10-Step Ethical Hacking Recon Guide
Learn the hacker recon checklist used in penetration testing and bug bounty hunting. Step-by-step reconnaissance guide with tools and practical…
Information Gathering Using Kali Linux Day 4: Network Mapping with Nmap
Information Gathering Using Kali Linux Day 4 - Learn Information Gathering using Kali Linux with Nmap step-by-step. Discover live hosts,…
Network Scanning Tutorial Using Nmap Day 3 — Port Scanning Techniques Deep Dive
Network Scanning Tutorial Using Nmap Day 3 - Learn professional port scanning using Nmap including TCP SYN, Connect, UDP, and…
Information Gathering Using Kali Linux Day 3: Subdomain Enumeration with Sublist3r
Information Gathering Using Kali Linux Day 3 - Learn Information Gathering using Kali Linux with Sublist3r step-by-step. Discover hidden subdomains…
Information Gathering Using Kali Linux Day 1: WHOIS Tutorial for Beginners
Information Gathering Using Kali Linux Day 1 - Learn Information Gathering using Kali Linux with WHOIS step-by-step. Beginner-friendly ethical hacking…