3.1.2. LAB PRACTICE - Footprinting With Maltego v1
3.1.2. LAB PRACTICE - Footprinting With Maltego v1
Task
After completing the tasks in Maltego, please answer all Questions on Lab Page:
https://networkwalks.com/footprinting-with-maltego-cybersecurity-practice-lab/
Related Info:
Note: If you are using Kali Linux then you can open Maltego directly because it comes pre-installed in Kali Linux
1 www.networkwalks.com [email protected]
Solution
Note: If you are using Kali Linux then you can open Maltego directly because it comes pre-installed in Kali Linux
2 www.networkwalks.com [email protected]
ii. Run the setup file & complete the installation of Maltego:
3 www.networkwalks.com [email protected]
iii. After installation, open Maltego as shown below:
4 www.networkwalks.com [email protected]
v. Click on ‘Register here’ as shown below:
vi. Fill in the detail & Register with Maltego as shown below (check your email
after registration & activate Maltego):
5 www.networkwalks.com [email protected]
vii. Return back to login screen & enter the Maltego username/password that you
have just registered in above step:
viii. Continue the next steps till end & then Maltego will open.
6 www.networkwalks.com [email protected]
ix. Click on the Application button and then click New:
7 www.networkwalks.com [email protected]
Task2 Which technologies are running on the target/victim’s server?
8 www.networkwalks.com [email protected]
Right-click on the main entity & run the Transform ‘Server Technologies[Using Builtwith]’:
Maltego will query & show all the technologies that this website server is running:
9 www.networkwalks.com [email protected]
Why Hackers need this information?
This information is useful for Hackers because with this information in hand, they can search for related
vulnerabilities & launch technology specific Hacking attacks based on the relevant exploits. For example, they
will run Wordpress related attacks on this website. We will study those specific attack examples in later sections.
10 www.networkwalks.com [email protected]
Task3 What is the name of Mail Server of target?
Right-click on the website entity & run the Transform ‘DNS Name [using Name Schema
dictionary]’:
11 www.networkwalks.com [email protected]
Answer: webmail.networkwalks.com
12 www.networkwalks.com [email protected]
Task4 What is the IP address of the Mail Server of target?
Right-click on the web server entity & run the Transform ‘IP Address [DNS]’:
13 www.networkwalks.com [email protected]
Answer: 192.232.216.135
14 www.networkwalks.com [email protected]
Task5 What is the name of FTP Server of target?
Answer: ftp.networkwalks.com (we have already queried this in previous task as shown
below).
15 www.networkwalks.com [email protected]
Task6 What is the IP Address of FTP Server of target?
Right-click on the FTP server entity & run the Transform ‘IP Address [DNS]’:
Answer: 192.232.216.135
16 www.networkwalks.com [email protected]
Why Maltego has pointed to the same IP address again?
Maltego will point to same IP address because both Mail & FTP services are hosted on same server
17 www.networkwalks.com [email protected]
Extra References & tips
Results from Maltego can also be exported in multiple formats that are readable by others like xlsx, pdf, ..
There are many other tools that can be used for footprinting in parallel with Maltego (we will study those one by
one in later sections)
Maltego’s has multiple versions & community edition is open-source & free to use with limited features
Maltego is commonly used by Hackers, enterprises, security researchers and private investigators
18 www.networkwalks.com [email protected]
© All Rights are reserved, Networkwalks Academy
Contact us for your Cybersecurity, CCNA, Linux, Python Programming & IT Training today [email protected].
Your Technical Questions, comments & suggestions are always Welcomed.
19 www.networkwalks.com [email protected]