Foot-printing is the first step of any attack on any system. This initial stage involves gathering valuable information about the target system or network.
Information Obtained in Footprinting
Below is presented the kind of information expected to be gathered throughout this phase. The list is by no means exhaustive.
Organization
Network
System
Employee details
Domain and sub-domains
Web server OS
Telephone numbers
Network blocks (IP ranges)
Location of web server
Branch and location details
Network topology, trusted routers and firewalls etc.
Recon-ng is a full-featured Web Reconnaissance framework written in Python. Recon-ng has a look and feel similar to the Metasploit Framework, reducing the learning curve for leveraging the framewor
Start: sudo recon-ng
Install all modules: marketplace install all
List all modules: modules search
Example of usage
First, create a new workspace: workspaces create NEWWORKSPACE
To list workspaces: workspaces list
Then, add a domain to the scope: db insert domains
To view added domains: show domains
Next, load a module: modules load MODULE
To run: run
To view hosts: show hosts
Recon-ng has some nice features to generate reports
MW Metadata normal grabs singular details about a YouTube video and its uploader, playlist and its creator, or channel.
Public FTP searcher
NAPALM FTP Indexer lets you search and download files located on public FTP servers.
Website crawler
Photon can extract the following data while crawling:
URLs (in-scope & out-of-scope)
URLs with parameters (example.com/gallery.php?id=2)
Intel (emails, social media accounts, amazon buckets etc.)
Files (pdf, png, xml etc.)
Secret keys (auth/API keys & hashes)
JavaScript files & Endpoints present in them
Strings matching custom regex pattern
Subdomains & DNS related data
photon -u www.DOMAIN.com
Can also utalize the Wayback machine. Use --wayback to fetch URLs from archive.org as seeds
Generate wordlist from website
CeWL (Custom Word List generator) is a ruby app which spiders a given URL, up to a specified depth, and returns a list of words which can then be used for password crackers such as John the Ripper.
Scan to a depth of 2 (-d 2) and use a minimum word length of 5 (-m 5), save the words to a file (-w docswords.txt), targeting the given URL (https://example.com):
Additional resources
The OSINT Framework is a nice place to explore additional foot-printing categories and associated tools.