Professional Documents
Culture Documents
ICS Session 04. LAB PRACTICE - Maltego Footprinting v1
ICS Session 04. LAB PRACTICE - Maltego Footprinting v1
ICS Session 04. LAB PRACTICE - Maltego Footprinting v1
Task
After completing the tasks in Maltego, please answer all Questions on Lab Page:
https://networkwalks.com/footprinting-with-maltego-cybersecurity-practice-lab/
Related Info:
Note: If you are using Kali Linux then you can open Maltego directly because it comes pre-installed in Kali Linux
1 www.networkwalks.com info@networkwalks.com
Solution
Note: If you are using Kali Linux then you can open Maltego directly because it comes pre-installed in Kali Linux
2 www.networkwalks.com info@networkwalks.com
ii. Run the setup file & complete the installation of Maltego:
3 www.networkwalks.com info@networkwalks.com
iii. After installation, open Maltego as shown below:
4 www.networkwalks.com info@networkwalks.com
v. Click on ‘Register here’ as shown below:
vi. Fill in the detail & Register with Maltego as shown below (check your email
after registration & activate Maltego):
5 www.networkwalks.com info@networkwalks.com
vii. Return back to login screen & enter the Maltego username/password that you
have just registered in above step:
viii. Continue the next steps till end & then Maltego will open.
6 www.networkwalks.com info@networkwalks.com
ix. Click on the Application button and then click New:
7 www.networkwalks.com info@networkwalks.com
Task2 Which technologies are running on the target/victim’s server?
8 www.networkwalks.com info@networkwalks.com
Right-click on the main entity & run the Transform ‘Server Technologies[Using Builtwith]’:
Maltego will query & show all the technologies that this website server is running:
9 www.networkwalks.com info@networkwalks.com
Why Hackers need this information?
This information is useful for Hackers because with this information in hand, they can search for related
vulnerabilities & launch technology specific Hacking attacks based on the relevant exploits. For example, they
will run Wordpress related attacks on this website. We will study those specific attack examples in later sections.
10 www.networkwalks.com info@networkwalks.com
Task3 What is the name of Mail Server of target?
Right-click on the website entity & run the Transform ‘DNS Name [using Name Schema
dictionary]’:
11 www.networkwalks.com info@networkwalks.com
Answer: webmail.networkwalks.com
12 www.networkwalks.com info@networkwalks.com
Task4 What is the IP address of the Mail Server of target?
Right-click on the web server entity & run the Transform ‘IP Address [DNS]’:
13 www.networkwalks.com info@networkwalks.com
Answer: 192.232.216.135
14 www.networkwalks.com info@networkwalks.com
Task5 What is the name of FTP Server of target?
Answer: ftp.networkwalks.com (we have already queried this in previous task as shown
below).
15 www.networkwalks.com info@networkwalks.com
Task6 What is the IP Address of FTP Server of target?
Right-click on the FTP server entity & run the Transform ‘IP Address [DNS]’:
Answer: 192.232.216.135
16 www.networkwalks.com info@networkwalks.com
Why Maltego has pointed to the same IP address again?
Maltego will point to same IP address because both Mail & FTP services are hosted on same server
17 www.networkwalks.com info@networkwalks.com
Extra References & tips
Results from Maltego can also be exported in multiple formats that are readable by others like xlsx, pdf, ..
There are many other tools that can be used for footprinting in parallel with Maltego (we will study those one by
one in later sections)
Maltego’s has multiple versions & community edition is open-source & free to use with limited features
Maltego is commonly used by Hackers, enterprises, security researchers and private investigators
18 www.networkwalks.com info@networkwalks.com