Know Your Enemy: Understanding Foot-printing in Ethical Hacking

Introduction

Footprinting is the process of gathering information about a system, organization, or
individual. Think of it like trying to learn more about a person before meeting them or researching a company
before working with them.In simple terms, footprinting is all about collecting as much data as possible about
the target — including domain names, IP addresses, technologies, and potential vulnerabilities — all without
directly interacting with the target system.This process can include details like domain names, IP addresses,
technologies used, public files, and even employee information. Whether passive or active, footprinting helps
paint a complete picture of the target’s digital presence.In this blog, we’ll explore the types of footprinting, the
tools used by professionals, real-life examples of how it works, and how organizations can protect
themselves from being profiled in this way.

Types of Foot-printing

Foot-printing techniques are generally categorized into two main types:
Passive and Active. Both serve the same goal to gather information but, the way they operate is quite
different.

Active Footprinting

Active footprinting involves direct interaction with the target system to gather
information. This makes it more accurate, but also more likely to be detected by security systems.It requires
direct engagement with the target. Think of it like you check the locks on the doors and windows, among
other potential entry points.

Examples of active reconnaissance activities include:

  1. Connecting to one of the company servers such as HTTP, FTP, and SMTP.
  2. Calling the company in an attempt to get information (social engineering).
  3. Entering company premises pretending to be a repairman.

Examples:

  • Ping sweeps.
  • Port scanning (Nmap).
  • Traceroute.

Risk: This may trigger firewalls or intrusion detection systems (IDS).

Passive Foot-printing

In passive foot-printing, information is collected without directly interacting with
the target system. It’s like quietly observing someone from a distance. The attacker avoids detection because
there is no direct communication with the target. Think of it like you are looking at target territory from afar
without stepping foot on that territory.

Passive reconnaissance activities include:

  1. Looking up DNS records of a domain from a public DNS server.
  2. Checking job ads related to the target website.
  3. Reading news articles about the target company.

Examples:

  • WHOIS, lookup.
  • Google dorking.
  • DNS enumeration.
  • Social media investigation.

Popular Foot-printing Tools & What They Do

Tool NameMain Purpose
whoisDomain registration details
nslookupDns records resolve
digAdvanced DNS querying tool
dnsdumpsterPassive reconnaissance tool
sublist3rSubdomain enumeration tool
ffufFuzzing tool — virtual host
enumeration

Lab Environment Setup: To perform hands-on testing of various foot-printing techniques, I used Kali
Linux 2025.2, running inside a VMware Workstation virtual machine. This virtual lab environment allowed
me to safely run reconnaissance tools without affecting any real network.

whois

Purpose:
WHOIS is a passive reconnaissance tool that helps gather publicly available information about a domain. It
reveals important details such as the domain owner, registrar, registration dates, and name servers. Open the
terminal and run the whois tryhackme.com command to get the information.

Command Used: whois tryhackme.com

From this WHOIS , we found that tryhackme.com is registered under NameCheap and is using Cloudflare
for its DNS. The domain is secured with a long registration period, indicating long-term intent and stability

Key Insights:
● The domain is active for a long period (16 years: 2018–2034).
● Hosted using Cloudflare name servers (good DDoS protection).
● Registered through NameCheap, a common low-cost registrar.

NSLookup

Purpose: Find the IP address of a domain name using nslookup, which stands for Name Server Look Up.
You need to issue the command nslookup DOMAIN_NAME, for example, nslookup tryhackme.com. Or,
more generally, you can use nslookup OPTIONS DOMAIN_NAME SERVER.

*There are many more public DNS servers that you can choose from if you want alternatives to your ISP’s
DNS servers.

Query typeResult
AIPV4 Addresses
AAAAIPV6 Addresses
CNAMECanonical Name
MXMail Servers
SOAStart of Authority
TXTTXT Records

Command Used:
nslookup -type=A tryhackme.com
nslookup -type=A iiuc.ac.bd

Command Used: nslookup -type=SOA iiuc.ac.bd

Dig

Purpose: For more advanced DNS queries and additional functionality, you can use dig, the acronym for
“Domain Information Groper,” if you are curious. Let’s use dig to look up the MX records and compare them
to nslookup. We can use dig DOMAIN_NAME, but to specify the record type, we would use dig
DOMAIN_NAME TYPE.

Command Used: dig iiuc.ac.bd MX

This shows that IIUC uses multiple third-party email providers(Gmail, Outlook, and Maileroo). For a penetration tester or attacker, this could be useful in identifying potential phishing targets.

DNSDumpster

To avoid such a time-consuming search, one can use an online service that offers detailed answers to DNS queries, such as DNSDumpster. If we search DNSDumpster for iiuc.ac.bd, we will discover the subdomain blog iiuc.ac.bd, which a typical DNS query cannot provide. In addition, DNSDumpster will return the collected DNS information in easy-to-read tables and a graph. DNSDumpster will also provide any collected information about listening servers.

Output:

Subdomain Analysis – all.iiuc.ac.bd, cce.iiuc.ac.bd

During the reconnaissance phase, analyzing subdomains can reveal internal systems, exposed services, and even shared infrastructure. Below is a summary of two such subdomains found during A record and service enumeration.

Risk Consideration: Open Apache services with version numbers exposed can be a risk if
unpatched. Reverse DNS revealing portal subdomains can help attackers craft targeted phishing
campaigns or attempt login brute-force on admin portals.
Recommendation: Disable version exposure in HTTP headers.

Shodan.io

Shodan.io tries to connect to every device reachable online to build a search engine of connected “things” in
contrast with a search engine for web pages.Shodan.io collects information related to any device it can find
connected online. Searching for iiuc.ac.bd on Shodan.io will display at least the record shown in the
screenshot above.

we can learn several things related to our search, such as:

  • IP address
  • Hosting company
  • Geographic location

Sublist3r

Purpose: Sublist3r is an OSINT-based subdomain enumeration tool written in Python. It helps security professionals discover publicly exposed subdomains of a target domain by querying multiple search engines and online resources.

Command used:
apt install sublist3r
sublist3r -d tryhackme.com

What This Means: Sublist3r helped enumerate multiple live subdomains related to tryhackme.com,
many of which could point to login panels, admin portals. These findings can be further scanned using tools
like nmap, or checked for open directories and version leaks.

Result:

Why Subdomain Enumeration Matters:

  • Subdomains often host separate web apps, some outdated or unprotected.
  • May lead to indirect entry points into the main infrastructure.
  • Helps in surface area mapping before vulnerability scanning.

Summary: Sublist3r is an easy-to-use but powerful tool that speeds up early-stage reconnaissance by
identifying hidden and forgotten web assets of a target organization.

Ethical Disclaimer!!!
The following section discusses the use of FFUF for virtual host
enumeration, which involves sending multiple crafted HTTP requests to a
web server. This technique can be considered aggressive or intrusive and
may trigger security systems like firewalls .This method should only be used
in authorized environments, such as your own lab setup, CTF platforms, or
with explicit permission from the target.

Virtual Host Enumeration using FFUF

What is VHost Enumeration?
One Web servers often host multiple websites on the same IP address, known as virtual hosts. Some of
these virtual hosts may not be listed in DNS and are meant to stay hidden. Virtual hosting is a feature that
allows a single web server to host multiple websites and have them appear as if they are hosted on separate,
individual servers.

Practical Demonstration: FFUF in Action (TryHackMe Lab)
To show a real-world use case of virtual host enumeration, I used the “TakeOver” room on TryHackMe. This
room focuses on subdomain enumeration, which is perfect for testing FFUF’s capabilities.

Room link : https://tryhackme.com/room/takeover

1st : Connecting TryHackMe server using openvpn.

2nd : Join room and copy IP and host name.

3rd : Connect my machine to Tryhackme server.

4th : Then we push Tryhackme room IP and domain name
keyboard :Ctrl-S→ Enter→ ctrl-X → y→ Enter
So we have fully connected our machine.

This is our test website for FFUF.

5th : Download the seclist wordlist.

6th : Enter the Command –
Command: ffuf -u https://[IP] -w [WordlistDirectory] -H “HOST:FUZZ.futurevera.thm” -fs 4605 -v -t 10

We find the 2 Fuffs : blog, support.

7th : Then we enter support website.

8th : Inspect the certificate to find the DNS name.

9th : Push the DNS name in host.

10th : Search for it in a browser and find the flag.

11th : Submit the flag and complete the room.

Summary

As the title suggests, this blog post is entirely dedicated to the first stage of ethical hacking, specifically, Foot-printing and Reconnaissance. The learning outcomes of this blog are both passive and active reconnaissance techniques, alongside the practical lab tasks on Kali Linux.

For passive information gathering, tools such as whois, nslookup, and dig helped us to perform passive enumeration alongside powerful virtual host discovery using ffuf. We introduced information gathering and its types followed with pictures and examples.

The focused coverage of the blog was to demonstrate using multiple tools on actual domains and how cybersecurity experts glean critical information prior to any active assessment. Due to the powerful nature of these tools, together with the risks associated with their use, we highlighted the responsibilities, ethics, and risks of such tools.

For CTF and penetration testing preparations, this blog and its practical insights will be valuable to advanced learners, while also serving to beginners with foot-printing techniques, broadening their scope of reconnaissance.

Disclaimer

This blog does not have any commercial purpose for using iiuc.ac.bd. I have not tried to hack, penetrate, or intrusively access the systems or networks of the institution’s digital infrastructure. Since my intentions for this demo are purely for educational purposes, I would like to demonstrate practical exposure to foot-printing techniques in the context of learning cybersecurity.

Conclusion

Foot-printing is the first step in understanding any target in the cyber world. As we explored tools and techniques from passive lookups to active enumeration, it becomes clear how important this stage is in ethical hacking and penetration testing. With ethical practice and legal boundaries in mind, we can use these techniques to strengthen systems rather than break them.

Acknowledgement

Special thanks to the IIUC Cyber Security Club for arranging this platform to encourage ethical hacking and practical cybersecurity knowledge sharing.

Share this
Picture of Shuvo deb nath
Shuvo deb nath

Leave a Reply

Your email address will not be published. Required fields are marked *