Skip to main content

CEH Module 2 Handwritten Notes | Footprinting and Reconnaissance

 Hello Great Learner 😊! 

Welcome to this new CEH handwritten notes from my Notes-Bucket. Yes, here you can download free cyber security notes for free. You can have handwritten written CEH notes here. The second unit in CEH v12 is 'Footprinting and Reconnaissance', and I made this in handwritten, these notes are just one click away from you now.

notes-bucket.blogspot.com

Click here to Download👇

CEH Module 2 Handwritten Notes

I hope you have downloaded the notes and found these well. So now I am telling here what is in these notes and what I have covered. I covered important and frequently asked topics. So, most of the headings are important and widely used tools and techniques for recon.

Here are the major heading that is covered in Module 2

  • Footprinting Concepts
  • Passive Footprinting
  • Active Footprinting
  • Information obtained in Footprinting
  • Footprinting Threats
  • Footprinting through Search Engines
  • Footprinting through Web Searches
  • Footprinting through Social Networking
  • Website Footprinting
  • Email Footprinting
  • Whois Footprinting
  • DNS Footprinting
  • Network Footprinting
  • Footprinting through Social Engineering

CEH v12 Module 1

Tools and Techniques

Technique/Tool Description
Advanced Google Searching
  • Complex search queries, search operators- site:, allinurl:, allintitle:, inanchor:, cache:, link:, info:, filetype: etc
  • Google Dorks
Google Hacking Database
  • exploit-db.com
  • GHDB
  • SearchSploit- A command line tool for GHDB
  • VPN footprinting through GHDB
Advanced Image Search
  • eGoogle Image search, TinEye, Yahoo, Yandex
Reverse Image Search
  • google.com/imghp
  • EZGif
Video Search Engines
  • Youtube Meta Data, Youtube Data Viewer
Meta Search Engine
  • StartpageMetager
FTP Search Engine
  • NAPALM Indexer
  • Freeware Web FTP File Search
IoT Search Engine
  • Shodan, Censys, Thingful
Meta Search Engine
  • mattw.io
  • startpage, MetaGer
  • eTools.ch
FTP
  • filezilla-project.org for sharing
  • NAPALM FTP Indexer
  • FreewareWeb FTP File Search
  • globalfilesearch.com
TLDs and Subdomains
  • Search Operator- site:example.com -inurl:www
  • Netcraft, Sublist3r, Pentest-Tools
People search
  • Spokeo, Intelius, pipl, BeenVerufued, WhitePages, PeekYou
Information from LinkedIn
  • theHarvester
Harvesting email lists
  • theHarvester, Email Spider
Job Sites
  • Dice, LinkedIn, SimplyHired
Deep and Dark web footprinting
  • Tor Browser, Freenet, GNVnet, I2P, Retroshare
Determining Operating System (OS)
  • Netcraft
  • Shodan
  • Censys
  • Nmap
VoIP and VPN
  • Shodan
Competitve Intelligence Gathering
  • EDGAR Database, D&B Hoovers, Lexis, Business Wire, Factiva, MarketWatch, The Wall Street Transcript, Euromonitor, Experian
  • The Search Monitor, USPTO, SEMRush, ABI/INFORMAL Global, Similar Web, SERank
  • Google Earth, Google Maps, Wiimapia
  • Google Finance MSN Money, Yahoo Finance, investing.com, Opencorporates
  • Crunchbase, Corporation, Wiki
  • Google Alerts, Twitter Alerts, Giga Alerts
  • Online Reputation Management (ORM)
  • Google Groups, Yahoo Groups
  • Network News Transfer Protocol, Usenet Newsgroups or Mailing Lists, Newshoting, Eweka, Supernews
  • GitHub, GitLab, Sourceforge, BitBucket, recon-ng
  • BuzzSumo, Google Trends, Hashatit, Ubersuggest
  • Followerwonk, HotSuite, Meltwater
  • Gephi, SocNetV, NodeXL
  • Sherlock, Social Searcher, User Recon
  • Telnet, Burpsuit, robot.txt file, WebScarab,Web Data Extractor, HTTrack Web Site Copier, Cyotek Webcopy, Archive.org Wayback Machine, Octoparse, Netpeak Spider, Link Extractor, CeWL, Exiftool, Web Data Extractor, Metagoofil, Website Watcher, Visual Ping, FollowThat Page, Web-Stat, Rank Tracker, Team Viewer, dicky.com, opentracker.net, Bounce Rate, goingup.com
  • Email header analysis, eMailTracker Pro, Infpga, Mailtrack, Politemail
  • whois lookup, domaintools.com, tamos.com, smart whois
  • IP2Location, IP Location Finder, IP Address Geographical Location Finder, DNS Records, Securitytrails, dnsdunpster
  • DNS Recon, Reverse Lookup, dnsrcon, PathAnalyzer Pro, Visual Roote, traceroute NG, ARIN whois, tracert,
  • Maltego, Recon ng, Recon Dog, BillCiphers, FOCA, OSR Frameworks, OSINT Framewrork, Spyse, Grecon, Th3Inspector, Orb

How are these notes helpful?

These notes are very helpful but everyone should remind themselves that they should make their handwritten notes because if you prepare and make notes then it will help to revise efficiently. The reason is your handwriting and the previous memory help to catch the points easily, it just recalls what your mind saved in the memory. It is my suggestion to everyone if you have enough time or you can then you should make your own written notes for every important you are studying because it will help you to revise every important thing during exams and interviews. 

If you download these notes you will find that are crisp and concise, I prepared them as short as I could. When you go through these notes you will find every important topic, tool and technique is there. Everything is written in heading and points format, which means all the headings are independent to be studied, you can go to any page or any point thing is separate from each other. 


httpsnotes-bucket.blogspot.com


If you are looking for other notes like other CEH modules or other tech topics then you could follow this blog, I will share other CEH Module Handwritten Notes one by one. You can check out other notes like Automata, C Programming Language, Database management system, Cyber Security, Operating System etc. You can check out these in Labels and Archives.

Lastly here is a short and important disclaimer- These notes are written by me so if you want to share them with others you can share these notes but alteration is not permitted. It may have some grammatical errors so please take care while referring to anything from it. You should cross-check while referring. It may also have a typo or spelling mirror for the tool name, some tools mentioned here will only be found on their particular websites, please check. 


Conclusion

Thank you for diving into the enriching world of cybersecurity with our CEH Module 2 Handwritten Notes. We believe in empowering individuals like you with accessible and comprehensive resources. Our notes cover the vital aspects of 'Footprinting and Reconnaissance' in CEH v12, ensuring that you grasp the fundamental concepts, tools, and techniques. By downloading these notes, you've equipped yourself with a concise yet thorough overview of essential topics, ranging from passive and active footprinting to social engineering. The organized format, with independent headings and points, allows for easy navigation and focused learning.  While our notes serve as a valuable reference, we encourage you to create your handwritten notes. The act of jotting down information aids memory retention, enhancing your ability to recall crucial details during exams and interviews.


Looking ahead, we are committed to sharing more CEH Module Handwritten Notes and exploring diverse tech topics. Stay tuned for updates on Automata, C Programming Language, Database Management System, Cyber Security, Operating System, and more. Please remember, that these notes are a product of dedication, and while sharing is encouraged, any alterations are not permitted. We acknowledge the possibility of minor errors, and we recommend cross-checking information for accuracy. Happy learning, and let the pursuit of knowledge fuel your journey in the fascinating realm of cybersecurity!


Popular posts from this blog

Theory Of Automata & Formal Languages KCA201 | Handwritten Notes

Theory of Computation, Automata and Formal Languages | Handwritten Notes Hello reader! I hope you are doing well. I am Aditya Kumar and here I am sharing my own handwritten Notes on the Theory of Computation and Automata. I prepared these notes for myself and want to share them with students looking at all topic-wise notes for semester exams and completing the syllabus. Click here 👇 to download notes: Theory Of Automata & Formal Languages This subject Theory of computation or Automata is an interesting subject and the most interesting thing is this is a theoretical subject. You learn how the programs are processed, when the outcome comes when the CPU stops the programs and many more things. After clearing my first semester in MCA, when I checked the subjects in MCA 2nd semester, I stopped on the word Automata. The word Automata reminded me of a famous sci-fi movie. I thought it would be a subject about robots and cyborgs but when I started to study I was totally surprised with th...

AKTU MCA Previous Year Question Papers 2nd Semester 2023

AKTU MCA Question Papers of 2nd Semester 2023 Abdul Kalam Technical University (AKTU) conducts Master of Computer Application (MCA), a 2-year Post Graduation course. In the 2nd semester of MCA there are a total of 6 subjects and 3 practicals- KCA201 Theory of Automata & Formal Languages KCA202 Object Oriented Programming KCA203 Operating Systems  KCA204 Database Management Systems KCA205 Data Structures & Analysis of Algorithms KCAA01         Cyber Security* Note: Cyber Security subject is only qualifying(marks will not be added) Practical Subjects KCA251 Object Oriented Programming Lab  KCA252 DBMS Lab  KCA253 Data Structures & Analysis of Algorithms Lab  Here you can download the pdf of all the Questions papers of the MCA 2nd Semester Click on following links to download👇 KCA201 Theory of Automata & Formal Languages 2023 KCA202 Object Oriented Programming 2023 KCA203 Operating Systems 2023 KCA204 D...

Handwritten Cyber Security Notes for AKTU MCA

Handwritten Cyber Security Notes Cyber Security (KCAA01) is a passing-only subject in MCA in AKTU-Dr. A. P. J. Abdul Kalam Technical University. The curriculum of this subject is almost theoretical but comprehensive to meet dynamic demands. The syllabus of Cyber Security is available on the AKTU website, you download and check it. Click here to download 👇 Download:  Cyber Security KCAA01 Cyber Security subject is in MCA Second Semester. This subject (KCAA01) consists of 5 units. These units have multiple topics related to cyber security. I have prepared handwritten notes for AKTU MCA because it is easy to learn with your own notes. It makes you feel confident and also helps you to revise faster. I decided to share these notes because when I was in 2nd semester in MCA I tried to find notes and googled them but I was not getting proper notes aligned with my syllabus. Then I decided to make my own notes. I searched each topic and also used some playlists from YouTube to create Handwr...