0% found this document useful (0 votes)
138 views20 pages

3.1.2. LAB PRACTICE - Footprinting With Maltego v1

footprintiing

Uploaded by

asigone123
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
138 views20 pages

3.1.2. LAB PRACTICE - Footprinting With Maltego v1

footprintiing

Uploaded by

asigone123
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

Footprinting with Maltego

(Cybersecurity Practice Labs)


Networkwalks Academy

Cyber Security Training www.networkwalks.com [email protected]


Footprinting with Maltego (Practical Lab)
(Cyber Security & Ethical Hacking Labs)

Task

Collect information about target organization networkwalks.com using


Maltego according to below requirements & complete all below tasks:

Task1 Download & install Maltego on a Windows Computer


Task2 Which technologies are running on the target/victim’s server?
(so that hacker can find vulnerabilities related to these technologies & exploit them)

Task3 What is the name of Mail Server of target?


Task4 What is the IP address of the Mail Server of target?
Task5 What is the name of FTP Server of target?
Task6 What is the IP address of the FTP Server of target?

After completing the tasks in Maltego, please answer all Questions on Lab Page:
https://networkwalks.com/footprinting-with-maltego-cybersecurity-practice-lab/

Related Info:
Note: If you are using Kali Linux then you can open Maltego directly because it comes pre-installed in Kali Linux

1 www.networkwalks.com [email protected]
Solution

Task1 DOWNLOAD & INSTALL MALTEGO


i. Download Maltego from official website on your windows laptop/computer:
https://www.maltego.com/downloads/

Note: If you are using Kali Linux then you can open Maltego directly because it comes pre-installed in Kali Linux

2 www.networkwalks.com [email protected]
ii. Run the setup file & complete the installation of Maltego:

3 www.networkwalks.com [email protected]
iii. After installation, open Maltego as shown below:

iv. Choose CE (Community Edition) as shown below:

4 www.networkwalks.com [email protected]
v. Click on ‘Register here’ as shown below:

vi. Fill in the detail & Register with Maltego as shown below (check your email
after registration & activate Maltego):

5 www.networkwalks.com [email protected]
vii. Return back to login screen & enter the Maltego username/password that you
have just registered in above step:

viii. Continue the next steps till end & then Maltego will open.

6 www.networkwalks.com [email protected]
ix. Click on the Application button and then click New:

x. Maltego is now ready to run transforms.

7 www.networkwalks.com [email protected]
Task2 Which technologies are running on the target/victim’s server?

Drag the website to main graph:

Double-click on the entity & change website name to www.networkwalks.com:

8 www.networkwalks.com [email protected]
Right-click on the main entity & run the Transform ‘Server Technologies[Using Builtwith]’:

Maltego will query & show all the technologies that this website server is running:

Answer: Wordpress, Yoest SEO, RSS, …

9 www.networkwalks.com [email protected]
Why Hackers need this information?
This information is useful for Hackers because with this information in hand, they can search for related
vulnerabilities & launch technology specific Hacking attacks based on the relevant exploits. For example, they
will run Wordpress related attacks on this website. We will study those specific attack examples in later sections.

10 www.networkwalks.com [email protected]
Task3 What is the name of Mail Server of target?

Right-click on the main entity & run the Transform ‘Domains[DNS]’:

Right-click on the website entity & run the Transform ‘DNS Name [using Name Schema
dictionary]’:

11 www.networkwalks.com [email protected]
Answer: webmail.networkwalks.com

Why Hackers need Web Server information?


Web Server information is useful for Hackers because they can search for related vulnerabilities & launch
technology specific Hacking attacks based on the relevant exploits. We will study those specific attack
examples in later sections.

12 www.networkwalks.com [email protected]
Task4 What is the IP address of the Mail Server of target?

Right-click on the web server entity & run the Transform ‘IP Address [DNS]’:

13 www.networkwalks.com [email protected]
Answer: 192.232.216.135

14 www.networkwalks.com [email protected]
Task5 What is the name of FTP Server of target?

Answer: ftp.networkwalks.com (we have already queried this in previous task as shown
below).

15 www.networkwalks.com [email protected]
Task6 What is the IP Address of FTP Server of target?
Right-click on the FTP server entity & run the Transform ‘IP Address [DNS]’:

Answer: 192.232.216.135

16 www.networkwalks.com [email protected]
Why Maltego has pointed to the same IP address again?
Maltego will point to same IP address because both Mail & FTP services are hosted on same server

17 www.networkwalks.com [email protected]
Extra References & tips

Results from Maltego can also be exported in multiple formats that are readable by others like xlsx, pdf, ..

There are many other tools that can be used for footprinting in parallel with Maltego (we will study those one by
one in later sections)

Maltego’s has multiple versions & community edition is open-source & free to use with limited features

Maltego was first released in October 200

Maltego is commonly used by Hackers, enterprises, security researchers and private investigators

Maltego is written in Java

Maltego is supported on Windows, Mac OS & Linux

18 www.networkwalks.com [email protected]
© All Rights are reserved, Networkwalks Academy

Contact us for your Cybersecurity, CCNA, Linux, Python Programming & IT Training today [email protected].
Your Technical Questions, comments & suggestions are always Welcomed.

19 www.networkwalks.com [email protected]

You might also like