Wtaixhxisagf8duttnpu shutterstock 161743937

Reconnaissance and Google Hacking

Learn Passive Hacking Tools and Techniques

  Enroll in Course


In Information Security, Reconnaissance or Footprinting or Information Gathering, is the most basic and first step, any hacker/attacker will take, if he wants to launch a systematic computer security attack. This process involves gathering of information about the target from every way possible, to reach a stage which could give him pointers to launch attack. Attacker always like to attack the weakest link which can be in form of an individual, service, configuration, device etc. Careful observation and analysis of these collected data can help attacker to decide attack scope and build strategy around it.

From Ethical Hackers/Security Testers prospect
Reconnaissance or Information Gathering is one of the first and initial step which any Ethical Hacker or Security Professional takes from Security Testing point of view. Information gathering process not only helps him to understand his target in better way but can also reveal his scope of testing and area where he needs to focus more from vulnerabilities point of view.
Traditionally, in security testing, information gathering (also known as Footprinting) is limited to discovery of IP address/Range, Server types, ports and services. But careful examination of gathered facts and details can also reveal data in form of internal corporate structure, management and process details, domain directory structures, sensitive files, configurations, databases, internal zero-day errors, contact information, application insights, vendor and client details and much more. If Social Engineering is in testing scope, Security reconnaissance may provide easy and detailed information required to bypass counter-checks at target’s end.

Passive Ethical Hacking is one of the trending security domain, as careful examination and manipulation of publicly available information can reveal much detailed insights and sensitive information, which traditionally requires lot of effort and active testing. Like, we may need to send number of network packets, run different analysis tools etc to get details on Network/Perimeter Firewall type. This information can easily be obtained from Internal or Public Job portal, if target has posted related job-opening. In-order to get exact and matching skill-sets, companies casually post some sensitive insights and details. Or, if we know some details of existing or old employees, either their resume posted on public job portals or their profile in Social Media will reveal tons of much desired details.

This course provides details of different active and passive information gathering tools and techniques. Some of the areas in Passive Ethical Hacking are also presented with help of dedicated video demonstration as proof-of-concept of the topic.

Google Hacking
Google is one of the most widely used and popular search engine. In order to make themselves publicly available, domains or websites, allow it to crawl on its pages and directory structure. Effective utilization of search operators not only helps in refining desired and appropriate result, but sometimes it may also reveal sensitive information in form of hidden pages, directories, files, documents, configurations etc. Google Hacking is a trendy term given to this process. Worst part is, all of this is done within ethical limits as all of this information or data is available in public although without target’s concise.

This course provides details on popularly used Google search operators and their advanced usage from Google Hacking point of view.

Recon Pentest
Reconnaissance Penetration Test or Recon Pentest is another trending domain and is getting popular as separate branch in Information Security Testing. Just like any other Security Testing process, this test is performed by an organization on itself to check its security systems. However, it mainly aims at flaws and vulnerabilities of the system which could cause or provide possibility of data leakage from publically or easily available sources. Although Reconnaissance or Footprinting is already present as first step in any Ethical hacking process, its scope is limited and objective in nature. While, Recon Pentest is treated as dedicated and detailed process for cause.

This course provides some brief insights on this process. It helps tester to decide scope of its testing process and workflow of same.

Why to take this course?

Click Here for complete course Curriculum

What you will learn?

  • Different Information Gathering Tools, Tricks and Techniques
  • Introduction to Information Reconnaissance tools like httrack, recon-ng, theharvester, fierce, shodan, nslookup and many more
  • Video demonstration as Proof-of-Concept for number of passive and active reconnaissance techniques
  • Insights to Google Search Operators
  • Google Hacking: Advanced usage of google search engine to reveal sensitive information
  • Basic countermeasures and best practices to prevent leakage of insights or sensitive information
  • Recon Pentest: Introduction to Reconnaissance Penetration Testing process

  • How it can help you?

    "Build or Master a Skill-set"

    • Information Gathering or Reconnaissance is one of the trending Passive Ethical Hacking skill-set in industry
    • It is one of initial and essential step/procedure in Ethical Hacking and Penetration Testing process
    • Thought-oriented process, helps in deciding scope of security testing
    • Learn to refine searches and explore areas from Google Hacking prospect

    “Learn unique Concepts”

    • Passive Hacking is one of the rarely touched domain in Security Industry
    • Learning its insights, tools, tricks and concepts helps in analyzing and testing associated fields
    • Careful examination of results, may reveal data from sensitive areas or may provide direct or easy exploration of target
    • “Must know” area, if someone wants to explore Social Engineering concept and its impact

    “Learn here, Apply anywhere”

    • All open source tools, also available pre-installed on any common security distro, like Kali, Backtrack etc
    • Make use of Internet and basic skills for information gathering process, so are applicable across public domains and servers


    • An Innovative mind to learn, modify and implement Security Tools and Techniques
    • Basic Understanding of Windows and Unix Operating System
    • Basic working experience on any Security Distro like Kali Linux, Backtrack etc
    • Creative approach to think and implement defensive measures
    • Basic Understanding of Networking and Security Concepts

    Target Audience

    • Information Security Professionals
    • Security Engineers and Administrators
    • Individuals involved in Vulnerability Assessment and Penetration Testing
    • Ethical Hackers
    • Network, Web and System Administrators
    • Web Developers
    • Application Security Testers
    • IT Professionals
    • Students, Fresh College Graduates, Job Seekers …

Class Curriculum

  Course Scope and Topics Covered
Available in days
days after you enroll
  Section#1: Reconnaissance: Introduction
Available in days
days after you enroll
  Section#5 Some more Tools ...
Available in days
days after you enroll
  Section#6 Google Search: Nuts and Bolts
Available in days
days after you enroll
  Section#7 Google Hack: Joining the Dots [Coming Soon!! .. ETA: 12/25/2015]
Available in days
days after you enroll

Enroll now and get...

1. Lifetime Access to Course and all updates

2. E-book as a Gift, delivered exclusively for your Amazon Kindle

Information Reconnaissance and Google Hackin g (Launch in Jan’2016)

3. Course Completion Certificate from Hack2Secure

4. Announcements, Pre-Sale and Discount Coupons for our upcoming courses

5. Dedicated Email-support to resolve your queries, by our expert team

Exclusive Festival Discount Offer

Use Coupon RECON25 to enroll at exclusive Launch discount price.

Launch Offer : 25% OFF
Coupon Code : RECON25
Offer End Date:

    For any question/query/concern about this course, feel free to email us at training@hack2secure.com

    Click here for some of the FAQs

Get started now!