FINDING TARGET FOR HACKING ON INTERNET IS NOW EASIER INTRODUCTION Finding target on internet for penetration testing involves searching internet using google or using Google Hacking/Dorking. There are google hacking queries available on internet, according to ethical hacking researcher of International Institute of Cyber Security it is the main source of passive attacks on internet. This whole process of finding target on internet using GHDB is automated using python based framework named as Katana framework. This tool can be used in open penetration testing. Katana framework tool is completely built on python language. In this tool, we have five different modules like Google Hacking Database, SCADA, TOR, Proxy and, Bitly. All these modules collect different types of sensitive information.
ENVIRONMENT
OS: Kali Linux 2019.3 64 bit Kernel version: 5.2.0
INSTALLATION STEPS
Use command to clone the file git clone https://github.com/adnane-X-tebbaa/Katana. root@kali:/home/iicybersecurity# git clone https://github.com/adnane-X-tebbaa/Katana Cloning into 'Katana'... remote: Enumerating objects: 109, done. remote: Counting objects: 100% (109/109), done. remote: Compressing objects: 100% (109/109), done. remote: Total 262 (delta 47), reused 0 (delta 0), pack-reused 153 Receiving objects: 100% (262/262), 2.45 MiB | 180.00 KiB/s, done. Resolving deltas: 100% (93/93), done.
Use cd command to enter into the directory o cd Katana/ root@kali:/home/iicybersecurity# cd Katana/ root@kali:/home/iicybersecurity/Katana#