Week 3 - Deep Dive into Footprinting and Burp Suite
As required by the course guidelines, any tools, techniques, and tutorials shared on this blog are strictly for educational purposes. I am not responsible for any misuse of the information or tools demonstrated here. Week 3 of Ethical Hacking and Penetration Testing got significantly more technical. We moved past the high-level theory of Target Scoping and Information Gathering and started getting our hands dirty with actual footprinting tools in our Kali Linux VMs. Here is a rundown of the practical techniques we covered. Target Scoping Realities Before launching into the tools, we discussed the logistics of scoping. It is not just about picking a target; it involves defining business objectives, establishing strict test boundaries, and setting up project management schedules. You need to know exactly what is allowed (e.g., black-box vs. white-box testing) and what is strictly off-limits before you start. Intercepting Traffic with Burp Suite One of the core practical skills this week ...