๐ต️♂️ CEH Module 1: Information Gathering – Discover the Digital Footprints
Welcome to Module 1 of the Certified Ethical Hacking (CEH) course — Information Gathering, also known as Footprinting.
This phase is crucial in ethical hacking. Before testing a system or launching any attack simulation, an ethical hacker must first collect as much information as possible — without touching the target system directly. Sounds interesting, right? Let’s break it down step by step.
๐ What is Information Gathering?
Information Gathering is the process of collecting data about a target system or organization using publicly available sources.
It’s usually divided into two main types:
-
✅ Passive Information Gathering – No direct interaction with the target.
-
✅ Active Information Gathering – Direct interaction to get more in-depth data.
๐งฐ Top Tools, Commands & Websites for Information Gathering
Let’s look at the most commonly used commands and websites that every ethical hacker should know in this phase.
๐ 1. WHOIS Lookup
๐น Command:
๐น Website:
๐ https://whois.domaintools.com
๐น Purpose:
Finds domain details such as registrant info, DNS, IP blocks, and creation/expiry dates.
๐ 2. DNS Enumeration
๐น Command:
๐น Advanced DNS Query:
๐น Online Tool:
๐ https://dnsdumpster.com
๐น Purpose:
Gathers DNS records, subdomains, MX records, and DNS zones.
๐ 3. Google Dorking
๐น Examples:
๐น Purpose:
Uncovers sensitive files, login portals, admin panels, and exposed directories using advanced search operators.
๐ 4. Shodan – Search Engine for Internet-Connected Devices
๐น Website:
๐ https://www.shodan.io
๐น Example Query:
๐น Purpose:
Finds open ports, services, webcams, and IoT devices exposed online.
๐ฌ 5. theHarvester – Collect Emails & Subdomains
๐น Command:
๐น Purpose:
Extracts public emails, subdomains, hosts, and names from search engines and public sources.
๐งพ 6. Netcraft – Hosting & Technology Discovery
๐น Website:
๐ https://www.netcraft.com
๐น Purpose:
Identifies hosting provider, technologies used (like Apache, Nginx, PHP), and server OS.
๐ 7. Censys – Internet-Wide Search Engine
๐น Website:
๐ https://censys.io
๐น Purpose:
Scans and indexes open ports, SSL certificates, and services of millions of hosts across the web.
๐ง 8. Recon-ng – Web Reconnaissance Framework
๐น Start Command:
๐น Purpose:
CLI-based tool used to automate reconnaissance tasks and integrate multiple public data sources.
๐ Quick Summary
Tool/Website | Function | Type |
---|---|---|
WHOIS | Domain ownership and IP details | Passive |
nslookup/dig | DNS and MX record lookup | Passive |
theHarvester | Collect email and subdomain data | Passive |
Google Dorks | Expose hidden content and files | Passive |
Shodan | Scan internet-facing services/devices | Passive |
Netcraft | Hosting provider and server tech info | Passive |
Censys | SSL certs, open ports, IP scanning | Passive |
Recon-ng | Automate information gathering | Passive |
⚠️ Legal Reminder
❗ Use these tools only on systems you own or are authorized to test.
Ethical hacking is about permission, education, and protection — not exploitation.
๐ What's Next?
In Module 2, we’ll step into Scanning and Enumeration, where we actively interact with the target to uncover live systems, open ports, and running services.
๐ Stay Connected with Us
Looking for exciting tech content, ethical hacking guides, and helpful tools?
Make sure you’re following us everywhere!
๐บ YouTube Channel:
TechFusionPro09
๐ฅ Tutorials, Tips & Tech Insights — Subscribe Now!
๐ธ Instagram:
@blackops404
๐ฅ Behind-the-scenes content, updates, and community vibes!
๐ Official Website:
mannutanwar.odoo.com
๐ Explore all our blogs, tools, and free courses in one place.
Comments
Post a Comment