Kali Linux Tutorial - Maltego - Website Hacking - Kali Linux Tools
What is Maltego ?
- Maltego is graphical link analysis tool.
- It is open source intelligence (OSINT) gathering and connecting information for investigative tasks.
- It is used for reconnaissance (Information gathering) and data-mining
- It is a unique platform which is developed to deliver a clear threat picture to the environment.
- The Unique advantage is to demonstrate the complexity of single points of failure.
Learn Ethical Hacking - Ethical Hacking tutorial - Maltego Tool - Ethical Hacking examples - Ethical Hacking programs
Alternatives of MALTEGO:
Datawalk
- Datawalk is a full stack analytics platform.
- It is used for the following terms:
- Reveal patterns,
- Relationships & anomalies for large scale and
- Multi-source intelligence software.
- There are some features of Datawalk : Simulation models , Dashboard creation , Visual Discovery and Content Management
Learn Ethical Hacking - Ethical Hacking tutorial - Data Walk Tool - Ethical Hacking examples - Ethical Hacking programs
Spiderfoot
- Spiderfoot is a reconnaissance tool ( To learn more about Kali Linux Tools ), that automates open source intelligence.
- It has an embedded web-server
- It is used to find everything possible about your target and integrate every data source available.
- In OSINT, an information gathered from publicly available sources which includes : Traditional mass media, geospatial information and web-based communities.
Learn Ethical Hacking - Ethical Hacking tutorial - Spider Foot Tool - Ethical Hacking examples - Ethical Hacking programs
Gephi
- Gephi is an open source software, which is for network analysis.
- It is designed for interactive exploration & visualization of networks
- It is used for visualizing and analysing large networks graphs.
- It is highly scalable (handling over 20,000 nodes)
Learn Ethical Hacking - Ethical Hacking tutorial - Gephi Tool - Ethical Hacking examples - Ethical Hacking programs
Linkurious
- Linkurious is on-premise graph visualization & Analysis software
- It was developed by Sebastien Heymann, David Raphin and Jean villedieu.
- It is used to detect suspicious patterns, investigate graph data easily.
- There are some features includes security , collaboration , graph search and visualization
Learn Ethical Hacking - Ethical Hacking tutorial - Linkurious Tool - Ethical Hacking examples - Ethical Hacking programs
Step 1
- Install Maltego from browser. Click Application and Select Information gathering -> Maltego then the Maltego Page will be loading.
Learn Ethical Hacking - Ethical Hacking tutorial - Select Information Gathering Maltego - Ethical Hacking examples - Ethical Hacking programs
Read Also
Step 2
- Open browser and Type maltego registration page then click First result. In Registration Page, Fill your details then click Register button. Now the Maltego page is opened.
Learn Ethical Hacking - Ethical Hacking tutorial - Maltego Page Opened - Ethical Hacking examples - Ethical Hacking programs
Step 3
- Now drag and drop the NS Record (for collecting host details through NS record) from entity palette to New graph page
Learn Ethical Hacking - Ethical Hacking tutorial - Ns Record - Ethical Hacking examples - Ethical Hacking programs
Step 4
- Now double tap the icon and enter your Target Website name.
Learn Ethical Hacking - Ethical Hacking tutorial - Enter Target Website - Ethical Hacking examples - Ethical Hacking programs
Step 5
- Enter kailaasa.org ( Demo-testing purpose which is used to collect details )
Learn Ethical Hacking - Ethical Hacking tutorial - Demo Testing Purpose - Ethical Hacking examples - Ethical Hacking programs
Read Also
Step 6
- Now Right click the icon and choose the Transforms (for Bunch of commands which is used to get all possible details about website). Then, select all transforms to view all commands.
Learn Ethical Hacking - Ethical Hacking tutorial - Select All Transforms - Ethical Hacking examples - Ethical Hacking programs
Step 7
- The Transforms are Running ( bottom right corner indicator will show )
Learn Ethical Hacking - Ethical Hacking tutorial - Transform Running - Ethical Hacking examples - Ethical Hacking programs
Step 8
- Run another transforms and get detail of Domain name and IP Address.
Learn Ethical Hacking - Ethical Hacking tutorial - Output Generated - Ethical Hacking examples - Ethical Hacking programs
Step 9
- Now Right click on the kailaasa.org web icon (for again extract the web page) then select All Transforms to view all commands.
Learn Ethical Hacking - Ethical Hacking tutorial - Select All Transform Again - Ethical Hacking examples - Ethical Hacking programs
Step 10
- The pop-up will appear then click Run button.(Not having any API key so leave it as default value).
Learn Ethical Hacking - Ethical Hacking tutorial - Popup Will Appear - Ethical Hacking examples - Ethical Hacking programs
Step 11
- Transforms are running. Now the tool is collecting DNS record and some web sites are displayed.
Learn Ethical Hacking - Ethical Hacking tutorial - Transforms Running - Ethical Hacking examples - Ethical Hacking programs
Step 12
- Finally got the more details such as Location, TV Channel page, Phone numbers, etc., and they are displayed here.
Learn Ethical Hacking - Ethical Hacking tutorial - Many Details - Ethical Hacking examples - Ethical Hacking programs
Read Also
Step 13
- Some telephone numbers are appeared.
Learn Ethical Hacking - Ethical Hacking tutorial - Telephone Numbers - Ethical Hacking examples - Ethical Hacking programs
Step 14
- Extract the Kailasa.tv page (for collecting hosting details) and Some server related information's are appeared.
Learn Ethical Hacking - Ethical Hacking tutorial - Server Related Information - Ethical Hacking examples - Ethical Hacking programs
Step 15
- Some Locations are appeared.
Learn Ethical Hacking - Ethical Hacking tutorial - Some Locations - Ethical Hacking examples - Ethical Hacking programs
Step 16
- Some sub-domains are appeared such as mail , ftp , gateway , etc.,
Learn Ethical Hacking - Ethical Hacking tutorial - Sub Domains - Ethical Hacking examples - Ethical Hacking programs
Step 17
- Now save the output through save as icon.
Learn Ethical Hacking - Ethical Hacking tutorial - Save The Output - Ethical Hacking examples - Ethical Hacking programs
Step 18
- Choose Path ( Location ) -> filename -> file type. Then click save button.
Learn Ethical Hacking - Ethical Hacking tutorial - Give File Name Type - Ethical Hacking examples - Ethical Hacking programs
Step 19
- Click the maltego icon then your saved file will appear.
Learn Ethical Hacking - Ethical Hacking tutorial - Click Maltego Icon - Ethical Hacking examples - Ethical Hacking programs
Step 20
- Saved file ( File name : kailaasa.mtgl ) is displayed.
Learn Ethical Hacking - Ethical Hacking tutorial - Saved File Shown - Ethical Hacking examples - Ethical Hacking programs
Step 21
- Saved file is opened ( It will shows dots which means the content is minimized (compressed) so zoom in ) then click zoom in icon from top right corner.
Learn Ethical Hacking - Ethical Hacking tutorial - Save File Opened - Ethical Hacking examples - Ethical Hacking programs
Step 22
- Here some extra details are appeared such as page source , page formats etc.,
Learn Ethical Hacking - Ethical Hacking tutorial - Extra Details - Ethical Hacking examples - Ethical Hacking programs
Read Also
Step 23
- Then copy the link (gateway.nithyananda.org) and paste in browser
Learn Ethical Hacking - Ethical Hacking tutorial - Copy The Link - Ethical Hacking examples - Ethical Hacking programs
Step 24
- The page will appeared but this page is featured page , which means the page is not ready to launch.
Learn Ethical Hacking - Ethical Hacking tutorial - Featured Page - Ethical Hacking examples - Ethical Hacking programs
Step 25
- Some information’s are displayed (Other portals).
Learn Ethical Hacking - Ethical Hacking tutorial - Info Displayed - Ethical Hacking examples - Ethical Hacking programs
Step 26
- Finally, click the maltego icon then click the Exit button.
Learn Ethical Hacking - Ethical Hacking tutorial - Click Exit - Ethical Hacking examples - Ethical Hacking programs
Step 27
- If you want to learn about Ethical Hacking Course & Kali Linux Tutorial , you can refer the following links Ethical Hacking Training in Chennai , Ethical Hacking tutorial , Hacking Course , Ethical Hacking Course in Chennai