Day 3
Practical Exercises with OSINT Tools
Objective
- Gain hands-on experience using OSINT tools to gather intelligence
Lab Tasks
-
Google Dorking
site:example.com filetype:doc
intitle:"Index of" -
Social Media Recon with Sherlock
sherlock target_username -
WHOIS and DNS Enumeration
whois example.com
dig example.com ANY
dnsenum example.com -
Network Recon with Shodan
shodan search apache country:IN -
Metadata Analysis
exiftool target_image.jpg
Lab Report Template
| Task | Tool Used | Command | Findings |
|---|---|---|---|
| Google Dorking | site:example.com | Found PDF files | |
| Username Search | Sherlock | sherlock target_username | User profiles |
| DNS Enumeration | dig/dnsenum | dig example.com | DNS records |
Learning Outcomes for Week 4
- ✅ Perform enumeration using NetBIOS, SMB, and DNS tools
- ✅ Understand OSINT methodologies and gather intelligence
- ✅ Use tools like Sherlock, ExifTool, and Shodan for practical recon
- ✅ Generate a comprehensive report from practical exercises