Tuesday, February 24, 2026

Information Gathering in Kali Linux – Complete Practical Lab Guide

 

Information Gathering in Kali Linux – Complete Practical Lab Guide

Information Gathering is the first and most critical phase of penetration testing. Before exploiting any system, a security professional must understand:

  • What systems are running

  • Which ports are open

  • What services are exposed

  • What information is publicly available

In this blog, you will learn how to perform Information Gathering using tools available in Kali Linux.


๐Ÿ” What is Information Gathering?

Information Gathering (Reconnaissance) is the process of collecting data about a target system, network, or domain.

It is divided into:

  • Passive Reconnaissance – Collecting data without interacting directly with the target

  • Active Reconnaissance – Direct interaction with the target (e.g., port scanning)

Kali Linux provides multiple built-in tools under:

Applications → Information Gathering


๐Ÿงช Lab Setup

To perform this lab safely:

  • Attacker Machine: Kali Linux

  • Target Machine: Metasploitable 2 or Ubuntu VM

  • Network Mode: Host-Only / Internal Network

Example IP setup:

MachineIP Address
Kali192.168.56.101
Target192.168.56.102

Check IP using:

ip a

1️⃣ Nmap – Network Discovery & Port Scanning

About Nmap

Nmap is the most powerful and widely used network scanning tool.

It helps in:

  • Host discovery

  • Port scanning

  • Service detection

  • OS detection


๐Ÿ”น Basic Host Discovery

Scan entire subnet:

nmap 192.168.56.0/24

This identifies live machines.


๐Ÿ”น Port Scanning

Scan target machine:

nmap 192.168.56.102

Scan specific ports:

nmap -p 21,22,80 192.168.56.102

๐Ÿ”น Service Version Detection

nmap -sV 192.168.56.102

This reveals service versions like Apache, FTP, SSH.


๐Ÿ”น OS Detection

sudo nmap -O 192.168.56.102

Nmap attempts to identify the operating system.


2️⃣ Zenmap – GUI Version of Nmap

About Zenmap

Zenmap is the graphical interface of Nmap.

It is useful for beginners who prefer GUI over command line.


How to Use

Launch:

zenmap

Or:

Applications → Information Gathering → Zenmap

Steps:

  1. Enter Target IP

  2. Select Profile (Quick Scan / Intense Scan)

  3. Click Scan

Zenmap provides:

  • Visual output

  • Topology mapping

  • Easy report saving


3️⃣ Stealth Scan (SYN Scan)

A Stealth Scan is performed using:

sudo nmap -sS 192.168.56.102

How It Works:

  • Sends SYN packet

  • Does not complete TCP handshake

  • Harder to detect

Comparison:

nmap -sT 192.168.56.102
Scan TypeOptionDescription
TCP Connect-sTFull handshake
Stealth SYN-sSHalf-open scan

Stealth scan is commonly used during penetration testing to avoid detection.


4️⃣ Dmitry – Domain Information Gathering

About Dmitry

Dmitry is used for collecting domain-related intelligence.

It performs:

  • WHOIS lookup

  • Subdomain discovery

  • Email harvesting


Usage Example

dmitry example.com

Full scan:

dmitry -winse example.com

Options:

  • -w → WHOIS

  • -i → IP lookup

  • -n → Netcraft info

  • -s → Subdomains

  • -e → Email addresses

This tool is useful for Passive Reconnaissance.


5️⃣ Maltego – Visual OSINT Mapping

About Maltego

Maltego is an advanced OSINT tool that visually maps relationships between domains, IPs, emails, and organizations.


Image




How to Use

  1. Open Maltego

  2. Create New Graph

  3. Drag a "Domain" entity

  4. Enter target domain

  5. Run Transforms

Maltego automatically maps:

  • Domain → IP

  • Domain → DNS

  • Domain → WHOIS

This provides a visual intelligence structure.


๐Ÿ“š Key Differences Between Tools

ToolTypePurpose
NmapActivePort & service scanning
ZenmapGUIVisual Nmap scanning
Stealth ScanActiveLow-detection scanning
DmitryPassiveDomain intelligence
MaltegoPassive/OSINTRelationship mapping

๐ŸŽฏ Learning Outcome

After completing this lab, you will:

  • Understand reconnaissance methodology

  • Perform active network scanning

  • Identify open ports and services

  • Gather domain intelligence

  • Visualize OSINT data

  • Compare CLI and GUI approaches

No comments:

Post a Comment