# Module 02 - Practical

Those are the steps that I took to complete the first flag-hunting session in the second module of the CEH v12 Practical Course.

### Flag 1

Use an advanced Google hacking technique to find PDF files on the website [www.eccouncil.org](http://www.eccouncil.org). Enter the complete URL of the CEH-Brochure.pdf file. In this flag you only need to apply google dork, this is a method provided by Google to make queries to get more precise information.

I suggest the following cheat sheet to learn fast about the commands for Advanced Google Search

{% embed url="<https://gist.github.com/sundowndev/283efaddbcf896ab405488330d1bbc06>" fullWidth="false" %}
<https://gist.github.com/sundowndev/283efaddbcf896ab405488330d1bbc06>
{% endembed %}

1. Google:           site:eccouncil.org filetype:pdf brochure

A:     <https://www.eccouncil.org/wp-content/uploads/2022/09/CEH-brochure.pdf>

### Flag 2

Search for “EC-Council CEHv11” on YouTube (<https://www.youtube.com>) and perform a reverse image search on the YouTube video titled as “EC-Council Certified Ethical Hacker (CEH) v11” using Youtube Metadata (<https://mattw.io/youtube-metadata/>) video analysis tool. Enter the Video ID.

Self-explanatory, there is no mystery in a YouTube Search.

1. Youtube Search:         EC-Council Certified Ethical Hacker (CEH) v11

A:        V\_i3wCtn0qA

### Flag 3

Use the NAPALM FTP Indexer (<https://www.searchftps.net/>) to extract critical FTP information about a target organization, Microsoft. Enter YES if you find files located on the target’s FTP servers; else, enter NO.

1. Open you browser and go to:             <https://www.searchftps.net/>
2. Search for “Microsoft”

<figure><img src="http://blogalpharhob.com/wp-content/uploads/2023/01/Image-1.bmp" alt="" height="117" width="395"><figcaption></figcaption></figure>

* You can see that there are a lot of files,

<figure><img src="https://blogalpharhob.com/wp-content/uploads/2023/01/Image-2.bmp" alt="" height="209" width="348"><figcaption></figcaption></figure>

A:        YES

### Flag 4

Use the Shodan IoT search engine to search for information about vulnerable IoT devices in a target organization, Amazon. Enter YES if you find details of vulnerable IoT devices related to amazon; else, enter NO.

1. Open your browser and go to:            <https://www.shodan.io/>
2. Search for “Amazon”

<figure><img src="https://blogalpharhob.com/wp-content/uploads/2023/01/Image-3.bmp" alt="" height="55" width="624"><figcaption></figcaption></figure>

* There are a lot of devices related to Amazon, one of them should have a vulnerability.

A:        YES

### Flag 5

Search for [www.eccouncil.org](http://www.eccouncil.org) on Netcraft (<https://www.netcraft.com>) and identify the operating system of the web server hosting the website [www.eccouncil.org](http://www.eccouncil.org/).

{% embed url="<https://www.netcraft.com>" %}

* From your browser, go to:      [https://www.netcraft.com](https://www.netcraft.com/)
* Go to **Resources** > **Site Report**

<figure><img src="https://blogalpharhob.com/wp-content/uploads/2023/01/Image-4.bmp" alt="" height="281" width="300"><figcaption></figcaption></figure>

* Search for       [www.eccouncil.org](http://www.eccouncil.org/)

There is nothing explicit about the operating system of the web server, so let’s try with other site.

{% embed url="<https://censys.io/domain?q=>" %}

* Go to:              <https://censys.io/domain?q=>
* Search for:      [www.eccouncil.org](http://www.eccouncil.org)
* Enter to the first IP and search in basic information.

<figure><img src="https://blogalpharhob.com/wp-content/uploads/2023/01/Image-5.bmp" alt="" height="201" width="464"><figcaption></figcaption></figure>

A:        Linux

### Flag 6

Gather personal information about Satya Nadella (CEO of Microsoft) using PeekYou (<https://www.peekyou.com>), an online people search service. Enter the name of the university where Satya Nadella studied MBA.

* Go to <https://www.peekyou.com/>
* Search for:      Satya Nadella
* Microsoft CEO

<figure><img src="https://blogalpharhob.com/wp-content/uploads/2023/01/Image-6.bmp" alt="" height="145" width="389"><figcaption></figcaption></figure>

A:        University of Chicago

### Flag 7

Use theHarvester tool to gather the list of email IDs related to Microsoft ([www.microsoft.com](http://www.microsoft.com)) organization from the Baidu search engine. Enter the option that specifies the domain or company name to search.

<figure><img src="https://blogalpharhob.com/wp-content/uploads/2023/01/Image-7.bmp" alt="" height="347" width="507"><figcaption></figcaption></figure>

A:        -d

### Flag 8

Use Tor Browser to perform searches on the deep and dark web. Identify the search engine Tor Browser uses to perform a dark web search.

A:        DuckDuckGo

### Flag 9

Use Censys (<https://search.censys.io/?q>) to perform the passive footprinting of [www.eccouncil.org](http://www.eccouncil.org). Flag submission is not required for this task, enter “No flag” as the answer.

{% embed url="<https://search.censys.io/?q=>" %}

* Go to <https://search.censys.io/?q>
* Search for: [www.eccouncil.org](http://www.eccouncil.org/)

A:        No flag

### Flag 10

Use theHarvester tool to gather information about the employees (name and job title) of a target organization (eccouncil.org) available on LinkedIn. Enter the option to specify the data source as LinkedIn.

<figure><img src="https://blogalpharhob.com/wp-content/uploads/2023/01/Image-8.bmp" alt="" height="149" width="624"><figcaption></figcaption></figure>

A:        -b

### Flag 11

Use the Sherlock tool to gather all the URLs related to Satya Nadella from various social networking sites. Enter the complete URL related to Satya Nadella that is obtained from the social networking site Academia.edu.

* Using your Parrot Virtual machine, go to the Sherlock folder
* Parrot Terminal: python3 sherlock.py satya nadella

```bash
git clone https://github.com/sherlock-project/sherlock
cd ./sherlock/sherlock
python3 sherlock.py satya nadella
```

A:        <https://independent.academia.edu/satya>

### Flag 12

Use the Followerwonk online tool (<https://followerwonk.com/analyze>) to gather Twitter information about Satya Nadella. What is the name of rating Followerwonk uses to rate a user’s influence and engagement on Twitter?

* Go to <https://followerwonk.com/analyze>
* Search for @SatyaNadella

<figure><img src="https://blogalpharhob.com/wp-content/uploads/2023/01/Image-9.bmp" alt="" height="68" width="624"><figcaption></figcaption></figure>

A:        Social Authority

### Flag 13

Use the ping command-line utility to test the reachability of the website [www.eccouncil.org](http://www.eccouncil.org). Identify the maximum packet/frame size on this machine’s network.

* Terminal:        `ping www.eccouncil.org-f -l 1500`
  * No response
* Terminal:        `ping www.eccouncil.org -f -l 1300`
  * Here you get a response, continue…
* ***After many iterations***
* Terminal:        `ping www.eccouncil.org -f -l 1472`

A:        1472

### Flag 14

Use Photon tool to crawl [www.certifiedhacker.com](http://www.certifiedhacker.com) website for internal, external and scripts URLs. What is the option that was used to specify the target website?

* `python3 photon.py -u http://www.certifiedhacker.com -l 3 -t 200 –wayback`
  * -u                     URL
  * -t                     Number of threads
  * \--wayback       specifies using URLs from archive.org as seed

A:        -u

### Flag 15

Use Photon tool to crawl [www.certifiedhacker.com](http://www.certifiedhacker.com) website using URLs from archive.org. Enter the option that specifies using URLs from archive.org as seeds.

A:        --wayback

### Flag 16

Gather information about [www.certifiedhacker.com](http://www.certifiedhacker.com) website using Central Ops. Enter the IP address gathered under Address lookup section.

* Go to <https://centralops.net/co/>
* Search for [www.certifiedhacker.com](http://www.certifiedhacker.com/)

<figure><img src="https://blogalpharhob.com/wp-content/uploads/2023/01/Image-10.bmp" alt="" height="131" width="382"><figcaption></figcaption></figure>

A:        162.241.216.11

### Flag 17

In the Windows 11 machine, use Web Data Extractor web spidering tool to gather the target company’s (<http://www.certifiedhacker.com>) data. Enter the contact email ID of the support department.

<figure><img src="https://blogalpharhob.com/wp-content/uploads/2023/01/Image-11.bmp" alt="" height="319" width="469"><figcaption></figcaption></figure>

<figure><img src="https://blogalpharhob.com/wp-content/uploads/2023/01/Image-12-1.bmp" alt="" height="174" width="618"><figcaption></figcaption></figure>

A:        <support@introspire.web>

### Flag 18

In the Windows 11 machine, use HTTrack Web Site Copier tool to mirror the entire website of the target organization (<http://www.certifiedhacker.com>). Enter the newly created HTML file name, which allows you to view the webpage of the mirrored website on any browser.

This is a concept question, remember, this tool always create the mirror website with the main URL as:

A:        index.html

### Flag 19

Use GRecon to search for available subdomains, sub-subdomains, login pages, directory listings, exposed documents, WordPress entries and pasting sites in target website. Enter the target that was used in this task to gather information.

```bash
git clone https://github.com/TebbaaX/GRecon
cd GRecon
python3 -m pip install -r requirements.txt
python3 Grecon.py
```

<figure><img src="https://blogalpharhob.com/wp-content/uploads/2023/01/Image-13.bmp" alt="" height="126" width="448"><figcaption><p>Set target as: certifiedhacker.com</p></figcaption></figure>

<figure><img src="https://blogalpharhob.com/wp-content/uploads/2023/01/Image-14.bmp" alt="" height="386" width="572"><figcaption></figcaption></figure>

A:                    certifiedhacker.com

### Flag 20

Use CeWL ruby application to gather a wordlist from the target website (<http://www.certifiedhacker.com>). Enter the command which allows you to gather a unique wordlist from the target website with a minimum word length of 6 and the depth of 3 to spider the target website.

<figure><img src="https://blogalpharhob.com/wp-content/uploads/2023/01/Image-15.bmp" alt="" height="93" width="624"><figcaption><p>CEWL Sample</p></figcaption></figure>

A:        cewl -d 3 -m 6 [www.certifiedhacker.com](http://www.certifiedhacker.com)

### Flag 21

In Windows 11 machine, use eMailTrackerPro tool located at E:\CEH-Tools\CEHv12 Module 02 Footprinting and Reconnaissance\Email Tracking Tools to gather information about an email by analyzing the email header. Observe the output and enter YES if the tool contains the “Abuse Reporting” feature; else, enter NO.

<figure><img src="https://blogalpharhob.com/wp-content/uploads/2023/01/Image-16.bmp" alt="" height="322" width="624"><figcaption><p>eMailTrackerPro’s Sample</p></figcaption></figure>

A:        YES

### Flag 22

Perform a Whois lookup using DomainTools and find the URL that belongs to registrar of the website [www.certifiedhacker.com](http://www.certifiedhacker.com/).

Browser:         <https://whois.domaintools.com/>

<figure><img src="https://blogalpharhob.com/wp-content/uploads/2023/01/Image-17.bmp" alt="" height="308" width="624"><figcaption></figcaption></figure>

A:        <http://networksolutions.com>

### Flag 23

Use the nslookup command-line utility to find the primary server of the website [www.certifiedhacker.com](http://www.certifiedhacker.com/)

<figure><img src="https://blogalpharhob.com/wp-content/uploads/2023/01/Image-18.bmp" alt="" height="333" width="426"><figcaption></figcaption></figure>

A:                    ns1.bluehost.com

### Flag 24

Perform a reverse DNS lookup using DNSRecon on IP range (162.241.216.0-162.241.216.255) to locate a DNS PTR record. Enter the DNS PTR record for IP address 162.241.216.11.

<figure><img src="https://blogalpharhob.com/wp-content/uploads/2023/01/Image-19.bmp" alt="" height="374" width="624"><figcaption></figcaption></figure>

A:        box5331.bluehost.com

### Flag 25

Use SecurityTrails to gather information regarding the subdomains and DNS records of the certifiedhacker.com website. Enter YES if you find any NS records; else, enter NO.

<figure><img src="https://blogalpharhob.com/wp-content/uploads/2023/01/Image-20.bmp" alt="" height="340" width="394"><figcaption></figcaption></figure>

A:        YES

### Flag 26

Use SecurityTrails to gather information regarding the subdomains and DNS records of the certifiedhacker.com website. Enter YES if you find any AAAA records; else, enter NO.

From the previous image, you can see it…

A:        NO

### Flag 27

Use the ARIN Whois database search tool (<https://www.arin.net/about/welcome/region>) to locate the network range of the target organization ([www.certifiedhacker.com](http://www.certifiedhacker.com)). Enter the network range information about the target organization.

* Go to <https://www.arin.net/about/welcome/region>
* Search for the Target IP:        162.241.216.11

<figure><img src="https://blogalpharhob.com/wp-content/uploads/2023/01/Image-21.bmp" alt="" height="269" width="397"><figcaption></figcaption></figure>

A:        162.240.0.0 – 162.241.255.255

### Flag 28

Perform network tracerouting using traceroute command in Linux machine for [www.certifiedhacker.com](http://www.certifiedhacker.com) domain. Enter the IP address of the target domain.

<figure><img src="https://blogalpharhob.com/wp-content/uploads/2023/01/Image-22.bmp" alt="" height="47" width="624"><figcaption></figcaption></figure>

A:                    162.241.216.11

### Flag 29

Use the Recon-ng tool to gather personnel information. Enter the Recon-ng module name, which allows you to find user profiles on various websites.

In the future, I will make a full post about recon-ng, stay tune!

A:                    recon/profiles-profiles/profiler

### Flag 30

Use the Maltego tool to gather information about the target organization ([www.certifiedhacker.com](http://www.certifiedhacker.com)). Enter the information about the mail exchange server associated with the certifiedhacker.com domain.

<figure><img src="https://blogalpharhob.com/wp-content/uploads/2023/01/Image-23.bmp" alt="" height="267" width="300"><figcaption></figcaption></figure>

A:                    mail.certifiedhacker.com

### Flag 31

Use the OSRFramework tool to check for the existence of a Mark Zuckerberg profile on different social networking platforms. Enter YES if the given user profile exists; else, enter NO.

* Type:               searchfy -q “Mark Zuckerberg”

<figure><img src="https://blogalpharhob.com/wp-content/uploads/2023/01/Image-24.bmp" alt="" height="335" width="624"><figcaption></figcaption></figure>

A:                    YES

### Flag 32

Use Foca tool to gather useful information about the [www.eccouncil.org](http://www.eccouncil.org). Enter the number of browsers that are available under Search engines section.

<figure><img src="https://blogalpharhob.com/wp-content/uploads/2023/01/Image-25.bmp" alt="" height="72" width="624"><figcaption></figcaption></figure>

3

### Flag 33

Use the BillCipher tool to footprint a target website URL ([www.certifiedhacker.com](http://www.certifiedhacker.com)). Identify the webserver application used to host the web pages.

A:        nginx

### Flag 34

Use the OSINT Framework (<https://osintframework.com>) to explore footprinting categories and associated tools. Enter the complete website URL of the Domain Dossier tool, which generates reports from public records.

<figure><img src="https://blogalpharhob.com/wp-content/uploads/2023/01/Image-26.bmp" alt="" height="153" width="474"><figcaption></figcaption></figure>

A:        <https://centralops.net/co/DomainDossier.aspx>
