Lab Exercise: Reconnaissance and Fingerprinting with Kali Linux
Objective
You will use Kali Linux to perform passive and active reconnaissance and fingerprinting on a designated domain, leveraging various tools to gather information ethically and safely.
Lab Scenario
You are a penetration tester tasked with gathering information about a target domain. The domain for this lab is hackthissite.org, a legal and ethical platform for cybersecurity training.
Lab Setup
- Environment: Ensure students have access to a Kali Linux virtual machine.
- Internet Connection: Verify internet connectivity on the Kali machine.
- Tools: Pre-installed tools in Kali Linux (Nmap, Netcat, whois, Wappalyzer, etc.).
- Target Domain: Use hackthissite.org for all fingerprinting activities (confirmed as ethical and legal for cybersecurity training purposes).
Kali Linux Installation as a Virtual Machine
Step 1: Download Virtualization Software
- Install a hypervisor such as VirtualBox or VMware Workstation Player (both are free).
- VirtualBox Download:
- VMware Player Download:
Step 2: Download Kali Linux ISO or Virtual Image
- Go to the official Kali Linux website:
- Navigate to the Downloads section.
- Choose one of the following:
- ISO file for manual installation.
- Pre-configured VirtualBox or VMware image for a quicker setup.
Step 3: Set Up the Virtual Machine
- Open your hypervisor (VirtualBox or VMware).
- Create a new virtual machine:
- Name: Kali Linux.
- Type: Linux.
- Version: Debian-based (64-bit).
- Allocate resources:
- Memory (RAM): Minimum 2 GB (Recommended: 4 GB).
- Disk Space: At least 20 GB.
- Attach the downloaded ISO file or select the pre-configured virtual image.
Step 4: Install Kali Linux (if using ISO)
- Start the virtual machine and boot from the ISO file.
- Follow the installation prompts:
- Select Graphical Install.
- Configure language, location, and keyboard layout.
- Set up a username and password.
- Partition the disk (choose guided setup for simplicity).
- Complete the installation and reboot.
Step 5: Update Kali Linux
- Log in to your new Kali Linux VM.
- Open the terminal and run:
sudo apt update && sudo apt upgrade -y
- Install any additional tools needed for the lab:
sudo apt install nmap netcat whois
Step 6: Test the Setup
- Verify network connectivity by running:
ping google.com
- Ensure tools like Nmap and Netcat are functioning:
- nmap –version
nc -h
Lab Instructions
Part 1: Passive Reconnaissance
- Google Dorks for Information Gathering:
- site:hackthissite.org filetype:pdf
- inurl:admin site:hackthissite.org
- Open the Firefox browser in Kali Linux.
- Use the following Google Dorks to identify publicly available information:
- Document any relevant results.
- WHOIS Lookup:
- Open the terminal in Kali Linux.
- Run the following command:
whois hackthissite.org
- Note the domain registration details (registrant, creation date, expiration date, etc.).
- Shodan Search:
- Open the Firefox browser and navigate to https://www.shodan.io/.
- Search for hackthissite.org.
- Document any exposed services, open ports, or technologies.
Part 2: Active Reconnaissance
- Nmap Scanning:
- Run a basic TCP scan:
nmap -sS hackthissite.org
- Perform service and version detection:
nmap -sV -O hackthissite.org
- Document the results, including open ports, running services, and potential vulnerabilities.
- Netcat for Banner Grabbing:
- Open a terminal and use Netcat to connect to an open port (e.g., port 80):
nc -v hackthissite.org 80
- Type HEAD / HTTP/1.0 and press Enter twice to grab the HTTP banner.
- Record the server type and version.
- Wappalyzer for Web Application Fingerprinting:
- Open the Firefox browser and install the Wappalyzer extension.
- Visit hackthissite.org and analyze the technologies used (e.g., CMS, JavaScript libraries).
- Take a screenshot of the Wappalyzer output.
Deliverables
- A report containing:
- Results of passive reconnaissance (Google Dorks, WHOIS, Shodan).
- Outputs of active reconnaissance (Nmap scans, Netcat results, Wappalyzer findings).
- Screenshots of tool outputs (include the entire screen with the clock/time).
- Reflection on the ethical considerations and importance of proper permissions in penetration testing.
{{{if possible give me a setup for macOS apple silicon m2 in a seperate file aside from this assignment}}}
Requirements: as long | Typescript

Leave a Reply
You must be logged in to post a comment.