Kali Linux Tutorial - Maltego - Website Hacking - Kali Linux Tools




What is Maltego ?

  • Maltego is graphical link analysis tool.
  • It is open source intelligence (OSINT) gathering and connecting information for investigative tasks.
  • It is used for reconnaissance (Information gathering) and data-mining
  • It is a unique platform which is developed to deliver a clear threat picture to the environment.
  • The Unique advantage is to demonstrate the complexity of single points of failure.
 Maltego Tool

Learn Ethical Hacking - Ethical Hacking tutorial - Maltego Tool - Ethical Hacking examples - Ethical Hacking programs

Alternatives of MALTEGO:

Datawalk

  • Datawalk is a full stack analytics platform.
  • It is used for the following terms:
    • Reveal patterns,
    • Relationships & anomalies for large scale and
    • Multi-source intelligence software.
  • There are some features of Datawalk : Simulation models , Dashboard creation , Visual Discovery and Content Management
 Data Walk Tool

Learn Ethical Hacking - Ethical Hacking tutorial - Data Walk Tool - Ethical Hacking examples - Ethical Hacking programs

Spiderfoot

  • Spiderfoot is a reconnaissance tool ( To learn more about Kali Linux Tools ), that automates open source intelligence.
  • It has an embedded web-server
  • It is used to find everything possible about your target and integrate every data source available.
  • In OSINT, an information gathered from publicly available sources which includes : Traditional mass media, geospatial information and web-based communities.
 Spider Foot Tool

Learn Ethical Hacking - Ethical Hacking tutorial - Spider Foot Tool - Ethical Hacking examples - Ethical Hacking programs

Gephi

  • Gephi is an open source software, which is for network analysis.
  • It is designed for interactive exploration & visualization of networks
  • It is used for visualizing and analysing large networks graphs.
  • It is highly scalable (handling over 20,000 nodes)
 Gephi Tool

Learn Ethical Hacking - Ethical Hacking tutorial - Gephi Tool - Ethical Hacking examples - Ethical Hacking programs

Linkurious

  • Linkurious is on-premise graph visualization & Analysis software
  • It was developed by Sebastien Heymann, David Raphin and Jean villedieu.
  • It is used to detect suspicious patterns, investigate graph data easily.
  • There are some features includes security , collaboration , graph search and visualization
 Linkurious Tool

Learn Ethical Hacking - Ethical Hacking tutorial - Linkurious Tool - Ethical Hacking examples - Ethical Hacking programs

Step 1

  • Install Maltego from browser. Click Application and Select Information gathering -> Maltego then the Maltego Page will be loading.
 Select Information Gathering Maltego

Learn Ethical Hacking - Ethical Hacking tutorial - Select Information Gathering Maltego - Ethical Hacking examples - Ethical Hacking programs

Step 2

  • Open browser and Type maltego registration page then click First result. In Registration Page, Fill your details then click Register button. Now the Maltego page is opened.
 Maltego Page Opened

Learn Ethical Hacking - Ethical Hacking tutorial - Maltego Page Opened - Ethical Hacking examples - Ethical Hacking programs

Step 3

  • Now drag and drop the NS Record (for collecting host details through NS record) from entity palette to New graph page
 Ns Record

Learn Ethical Hacking - Ethical Hacking tutorial - Ns Record - Ethical Hacking examples - Ethical Hacking programs

Step 4

  • Now double tap the icon and enter your Target Website name.
 Enter Target Website

Learn Ethical Hacking - Ethical Hacking tutorial - Enter Target Website - Ethical Hacking examples - Ethical Hacking programs

Step 5

  • Enter kailaasa.org ( Demo-testing purpose which is used to collect details )
 Demo Testing Purpose

Learn Ethical Hacking - Ethical Hacking tutorial - Demo Testing Purpose - Ethical Hacking examples - Ethical Hacking programs

Step 6

  • Now Right click the icon and choose the Transforms (for Bunch of commands which is used to get all possible details about website). Then, select all transforms to view all commands.
 Select All Transforms

Learn Ethical Hacking - Ethical Hacking tutorial - Select All Transforms - Ethical Hacking examples - Ethical Hacking programs

Step 7

  • The Transforms are Running ( bottom right corner indicator will show )
 Transform Running

Learn Ethical Hacking - Ethical Hacking tutorial - Transform Running - Ethical Hacking examples - Ethical Hacking programs

Step 8

  • Run another transforms and get detail of Domain name and IP Address.
 Output Generated

Learn Ethical Hacking - Ethical Hacking tutorial - Output Generated - Ethical Hacking examples - Ethical Hacking programs

Step 9

  • Now Right click on the kailaasa.org web icon (for again extract the web page) then select All Transforms to view all commands.
 Select All Transform Again

Learn Ethical Hacking - Ethical Hacking tutorial - Select All Transform Again - Ethical Hacking examples - Ethical Hacking programs

Step 10

  • The pop-up will appear then click Run button.(Not having any API key so leave it as default value).
 Popup Will Appear

Learn Ethical Hacking - Ethical Hacking tutorial - Popup Will Appear - Ethical Hacking examples - Ethical Hacking programs

Step 11

  • Transforms are running. Now the tool is collecting DNS record and some web sites are displayed.
 Transforms Running

Learn Ethical Hacking - Ethical Hacking tutorial - Transforms Running - Ethical Hacking examples - Ethical Hacking programs

Step 12

  • Finally got the more details such as Location, TV Channel page, Phone numbers, etc., and they are displayed here.
 Many Details

Learn Ethical Hacking - Ethical Hacking tutorial - Many Details - Ethical Hacking examples - Ethical Hacking programs

Step 13

  • Some telephone numbers are appeared.
 Telephone Numbers

Learn Ethical Hacking - Ethical Hacking tutorial - Telephone Numbers - Ethical Hacking examples - Ethical Hacking programs

Step 14

  • Extract the Kailasa.tv page (for collecting hosting details) and Some server related information's are appeared.
 Server Related Information

Learn Ethical Hacking - Ethical Hacking tutorial - Server Related Information - Ethical Hacking examples - Ethical Hacking programs

Step 15

 Some Locations

Learn Ethical Hacking - Ethical Hacking tutorial - Some Locations - Ethical Hacking examples - Ethical Hacking programs

Step 16

  • Some sub-domains are appeared such as mail , ftp , gateway , etc.,
 Sub Domains

Learn Ethical Hacking - Ethical Hacking tutorial - Sub Domains - Ethical Hacking examples - Ethical Hacking programs

Step 17

  • Now save the output through save as icon.
 Save The Output

Learn Ethical Hacking - Ethical Hacking tutorial - Save The Output - Ethical Hacking examples - Ethical Hacking programs

Step 18

  • Choose Path ( Location ) -> filename -> file type. Then click save button.
 Give File Name Type

Learn Ethical Hacking - Ethical Hacking tutorial - Give File Name Type - Ethical Hacking examples - Ethical Hacking programs

Step 19

  • Click the maltego icon then your saved file will appear.
 Click Maltego Icon

Learn Ethical Hacking - Ethical Hacking tutorial - Click Maltego Icon - Ethical Hacking examples - Ethical Hacking programs

Step 20

  • Saved file ( File name : kailaasa.mtgl ) is displayed.
 Saved File Shown

Learn Ethical Hacking - Ethical Hacking tutorial - Saved File Shown - Ethical Hacking examples - Ethical Hacking programs

Step 21

  • Saved file is opened ( It will shows dots which means the content is minimized (compressed) so zoom in ) then click zoom in icon from top right corner.
 Save File Opened

Learn Ethical Hacking - Ethical Hacking tutorial - Save File Opened - Ethical Hacking examples - Ethical Hacking programs

Step 22

  • Here some extra details are appeared such as page source , page formats etc.,
 Extra Details

Learn Ethical Hacking - Ethical Hacking tutorial - Extra Details - Ethical Hacking examples - Ethical Hacking programs

Step 23

  • Then copy the link (gateway.nithyananda.org) and paste in browser
 Copy The Link

Learn Ethical Hacking - Ethical Hacking tutorial - Copy The Link - Ethical Hacking examples - Ethical Hacking programs

Step 24

  • The page will appeared but this page is featured page , which means the page is not ready to launch.
 Featured Page

Learn Ethical Hacking - Ethical Hacking tutorial - Featured Page - Ethical Hacking examples - Ethical Hacking programs

Step 25

  • Some information’s are displayed (Other portals).
 Info Displayed

Learn Ethical Hacking - Ethical Hacking tutorial - Info Displayed - Ethical Hacking examples - Ethical Hacking programs

Step 26

  • Finally, click the maltego icon then click the Exit button.
 Click Exit

Learn Ethical Hacking - Ethical Hacking tutorial - Click Exit - Ethical Hacking examples - Ethical Hacking programs

Step 27



Related Searches to Maltego - Website Hacking | Kali Linux Tutorial | Kali Linux Tools