Eh Lab Manual Final
Eh Lab Manual Final
3. Using FOCA / SearchDiggity tools, extract metadata and expanding the target
list.
4. Aggregates information from public databases using online free tools like
Paterva’s Maltego.
FOCA : http://www.informatica64.com/foca.aspx.
Nessus : http://www.tenable.com/products/nessus.
Wireshark : http://www.wireshark.org.
Armitage : http://www.fastandeasyhacking.com/.
Ex:No.: 1
Aim:
To Install Kali Linux on Windows using Oracle Virtual Box
Procedure:
1. VirtualBox Installation:
● Proceed to download VirtualBox fromthe official
website( https://www.virtualbox.org/wiki/Downloads )
● With the virtual machine configured, you can now proceed with the installation
of Kali Linux. To do this, click the “Start” button in the toolbar orright-click >
selectstart > normalstart.
● In the nextscreen, keep the domain name blank. Then give your
name and user name(theloginname). Enter the password for
that user.
● In the partition screen,select “guided – use the entire disk”. This is
the best option for installing in VirtualBox. If installing it on the
physical system, do not use this.
● Wait For The Installation to finish. Kali Linux installation VirtualBox will
take a few minutes (approximately 10 minutes). While nearing the end
of the installation,the installer will ask you about the GRUB installation.
Answer Yes and choose the device /dev/sda and continue.
Result:
The installation of Kali Linux on VirtualBox was successful, creating a safe space
to explore ethical hacking tools and techniques.
Aim:
To Practise the Basics of Reconnaissance in Ethical Hacking.
Sample Output:
Sample Output:
3. WHOIS Lookup:
● Command: whois <target_domain>
● Use: Retrieve registration and ownership information about a domain.
Sample Output:
4. Traceroute:
● Command: traceroute <target_domain>
● Use: Identify the path packets take from your system to the target,
revealing intermediate routers' IP addresses.
Sample Output:
10
Result:
Thus, essential reconnaissance techniques in ethical hacking were practiced using
terminal commands, successfully enabling the gathering of information about target
IP addresses, domains, DNS records, and registration details.
11
Aim:
To understand how to extract metadata from a website using FOCA (Fingerprinting
Organizations with Collected Archives) software.
Procedure:
12
5. Extracting Metadata
● Once all files are downloaded, right-click again on any downloaded file in
FOCA.
● Choose 'Extract All Metadata'.
● Wait for the process to complete.
Output:
Result:
13
Aim:
The aim of this lab is to teach you how to use Paterva's Maltego for aggregating
information from public databases.
Procedure:
1. Installing Maltego
● Visit the official Maltego website to download the software. Make sure to
choose the correct version for your operating system.
● Install Maltego by following the on-screen instructions.
● Once the installation is complete, open the Maltego application.
● Register or log in to your Maltego account.
2. Creating a New Graph
● Click on the 'File' menu in the Maltego interface and then select 'New'.
● A new graph window will open, which will be your workspace for this session.
3. Basic Entity Search
● Drag and drop an entity type (like "Domain", "Email Address", etc.) from the
Entity Palette on the left into the graph.
● Double-click on the entity and enter the specific domain or email address you
want to investigate.
4. Run a Transform
● Right-click on the entity you've placed on the graph.
● From the 'Run Transform' menu, select an appropriate transform. For example,
you might choose "To Email [Using Search Engine]" for an email entity.
● Maltego will execute the transform and provide you with new entities
connected to your original entity.
5. Exploring and Aggregating Information
● Continue to run more transforms on the new entities that appear on your
graph to gather more information.
● You can adjust your view, zoom in/out, and rearrange entities as needed for
better understanding.
o Aggregated data might include things like associated social media
accounts,related websites, IP addresses, etc.
14
Output:
Result:
Thus, Information Aggregation with Paterva's Maltego has been successfully done
and executed.
15
Ex:No.: 5
Aim:
The aim of this lab exercise is to understand how to gather information on domains,
IP addresses, and networks using Robtex, an online tool that provides various kinds
of data for network research.
Procedure:
1. Accessing Robtex
● Open your web browser and go to the Robtex website by navigating to
https://www.robtex.com/.
● You will see a search bar on the main page, where you can enter the domain
name, IP address, or network that you wish to investigate.
2. Domain Lookup
● In the Robtex search bar, type the domain you want to investigate. For
example, example.com.
● Click the 'Search' button or press Enter.
● Robtex will return a wealth of information about the domain, including DNS
records, IP address data, server location, and more.
3. IP Address Lookup
● In the Robtex search bar, enter the IP address you want to investigate.
● Hit the 'Search' button or press Enter.
● Robtex will provide data related to the IP address, such as the owning
organization, geolocation, ASN information, and potentially linked domains.
4. ASN Lookup
If you want to search for an Autonomous System Number (ASN), enter it into the
search bar.
Press the 'Search' button.
Information like AS routes, IP ranges, and associated domains will be displayed.
16
Output:
Result:
Thus, the gathering of information using Robtex has been successfully done and
executed.
17
Ex:No.: 6
Aim:
To understand how to use Nessus for vulnerability scanning on a target system or
network.
Procedure:
2. Updating Plugins
● Before starting your scan, it's recommended to update Nessus plugins to get
the latest vulnerability checks.
● Usually, Nessus updates its plugins automatically, but you can manually
update them by navigating to the 'Plugins' section and clicking 'Update'.
18
Output:
19
Result:
Thus, the Scanning a Target Using Nessus has been successfully done and
executed.
20
Ex:No.: 7
View and capture network traffic using Wireshark.
Aim:
To View and capture network traffic using Wireshark.
Procedure:
1. Download Wireshark:
● Visit the official Wireshark download page at
https://www.wireshark.org/download.html.
● Download the appropriate version for your operating system (Windows,
macOS, or Linux).
2. Install Wireshark:
● Run the downloaded installer.
● Follow the installation wizard's instructions.
3. Launch Wireshark:
● Once the installation is complete, open the Wireshark application.
7. Stop Capturing:
● When you have captured enough data or want to stop the capture, click the
"Stop" or "Capture" button again.
21
Output:
Result:
Thus, Viewing and capturing network traffic using Wireshark has been successfully
done and executed
22
Aim:
To Automate dig for vulnerabilities and match exploits using Armitage FOCA
Procedure:
2. Vulnerability Analysis:
● Conduct vulnerability scanning on the target hosts using Armitage's built-in
features.
● Identify potential vulnerabilities in the scanned systems, such as outdated
software, weak passwords, or misconfigurations.
● Use FOCA (Fingerprinting Organizations with Collected Archives) to gather
information about the target organization's documents and metadata.
23
Output:
Result:
Thus, Automate dig for vulnerabilities and match exploits using Armitage FOCA has
been successfully done.
24