๐Ÿ•ต️‍♂️ CEH Module 1: Information Gathering – Discover the Digital Footprints

Welcome to Module 1 of the Certified Ethical Hacking (CEH) course — Information Gathering, also known as Footprinting.

This phase is crucial in ethical hacking. Before testing a system or launching any attack simulation, an ethical hacker must first collect as much information as possible — without touching the target system directly. Sounds interesting, right? Let’s break it down step by step.


๐Ÿ“– What is Information Gathering?

Information Gathering is the process of collecting data about a target system or organization using publicly available sources.

It’s usually divided into two main types:

  • Passive Information Gathering – No direct interaction with the target.

  • Active Information Gathering – Direct interaction to get more in-depth data.


๐Ÿงฐ Top Tools, Commands & Websites for Information Gathering

Let’s look at the most commonly used commands and websites that every ethical hacker should know in this phase.


๐Ÿ”Ž 1. WHOIS Lookup

๐Ÿ”น Command:

bash
whois example.com

๐Ÿ”น Website:
๐Ÿ‘‰ https://whois.domaintools.com

๐Ÿ”น Purpose:
Finds domain details such as registrant info, DNS, IP blocks, and creation/expiry dates.


๐ŸŒ 2. DNS Enumeration

๐Ÿ”น Command:

bash
nslookup example.com

๐Ÿ”น Advanced DNS Query:

bash
dig example.com ANY

๐Ÿ”น Online Tool:
๐Ÿ‘‰ https://dnsdumpster.com

๐Ÿ”น Purpose:
Gathers DNS records, subdomains, MX records, and DNS zones.


๐Ÿ” 3. Google Dorking

๐Ÿ”น Examples:

plaintext
site:example.com filetype:pdf intitle:"index of" confidential

๐Ÿ”น Purpose:
Uncovers sensitive files, login portals, admin panels, and exposed directories using advanced search operators.


๐ŸŒŽ 4. Shodan – Search Engine for Internet-Connected Devices

๐Ÿ”น Website:
๐Ÿ‘‰ https://www.shodan.io

๐Ÿ”น Example Query:

plaintext
apache port:80 country:"IN"

๐Ÿ”น Purpose:
Finds open ports, services, webcams, and IoT devices exposed online.


๐Ÿ“ฌ 5. theHarvester – Collect Emails & Subdomains

๐Ÿ”น Command:

bash
theharvester -d example.com -b google

๐Ÿ”น Purpose:
Extracts public emails, subdomains, hosts, and names from search engines and public sources.


๐Ÿงพ 6. Netcraft – Hosting & Technology Discovery

๐Ÿ”น Website:
๐Ÿ‘‰ https://www.netcraft.com

๐Ÿ”น Purpose:
Identifies hosting provider, technologies used (like Apache, Nginx, PHP), and server OS.


๐Ÿ” 7. Censys – Internet-Wide Search Engine

๐Ÿ”น Website:
๐Ÿ‘‰ https://censys.io

๐Ÿ”น Purpose:
Scans and indexes open ports, SSL certificates, and services of millions of hosts across the web.


๐Ÿง  8. Recon-ng – Web Reconnaissance Framework

๐Ÿ”น Start Command:

bash
recon-ng

๐Ÿ”น Purpose:
CLI-based tool used to automate reconnaissance tasks and integrate multiple public data sources.


๐Ÿ“Œ Quick Summary

Tool/WebsiteFunctionType
WHOISDomain ownership and IP detailsPassive
nslookup/digDNS and MX record lookupPassive
theHarvesterCollect email and subdomain dataPassive
Google DorksExpose hidden content and filesPassive
ShodanScan internet-facing services/devicesPassive
NetcraftHosting provider and server tech infoPassive
CensysSSL certs, open ports, IP scanningPassive
Recon-ngAutomate information gatheringPassive

⚠️ Legal Reminder

Use these tools only on systems you own or are authorized to test.
Ethical hacking is about permission, education, and protection — not exploitation.


๐Ÿ”œ What's Next?

In Module 2, we’ll step into Scanning and Enumeration, where we actively interact with the target to uncover live systems, open ports, and running services.


๐Ÿ”— Stay Connected with Us

Looking for exciting tech content, ethical hacking guides, and helpful tools?
Make sure you’re following us everywhere!

๐Ÿ“บ YouTube Channel:
TechFusionPro09
๐ŸŽฅ Tutorials, Tips & Tech Insights — Subscribe Now!

๐Ÿ“ธ Instagram:
@blackops404
๐Ÿ”ฅ Behind-the-scenes content, updates, and community vibes!

๐ŸŒ Official Website:
mannutanwar.odoo.com
๐Ÿ“š Explore all our blogs, tools, and free courses in one place.

Comments

Popular posts from this blog

๐Ÿ“ก CEH Module 3: Scanning & Enumeration – Uncovering Open Doors in Networks

๐Ÿ” CEH Module 2: Scanning and Enumeration – The Art of Finding Open Doors

Main Home