Footprinting & Reconnaissance COMPLETE Tutorial 2026 | CEH v13 Ethical Hacking
π Want to think like a hacker? This is where every attack begins β Footprinting & Reconnaissance. In this CEH v13 complete tutorial, I break down exactly h...

Shield Spectrum
695 views β’ Feb 10, 2026

About this video
π Want to think like a hacker? This is where every attack begins β Footprinting & Reconnaissance.
In this CEH v13 complete tutorial, I break down exactly how ethical hackers gather intelligence on any target β using Google Dorks, Shodan, OSINT tools, DNS Dumpster, Assetfinder, and AI-powered recon techniques. Step-by-step. No fluff.
Whether you're preparing for the CEH v13 exam or building real-world penetration testing skills, this video covers everything you need to master the first phase of ethical hacking.
βββββββββββββββββββββββ
π‘οΈ WHAT YOU'LL LEARN:
βββββββββββββββββββββββ
β Passive vs Active Reconnaissance (difference & when to use each)
β Advanced Google Dorking + AI-assisted dork generation
β Shodan β finding exposed cameras, servers & admin panels
β OSINT tools: Wayback Machine, Spokeo, OpenCorporates
β Subdomain enumeration with Assetfinder & TGPT
β DNS Dumpster β mapping entire network infrastructure
β Whois & DNS lookups for target profiling
β IP tracing with IP2Location & Grabify
βββββββββββββββββββββββ
β±οΈ TIMESTAMPS:
βββββββββββββββββββββββ
00:00 - Introduction & Hook
00:40 - Ethical Use Disclaimer
02:00 - Footprinting Overview (Passive vs Active)
05:18 - Google Dorks & GHDB
07:15 - AI-Powered Dork Generation
08:45 - Shodan Deep Dive
12:00 - OSINT Services (Wayback, Spokeo, OpenCorporates)
17:03 - DNS Dumpster & Network Mapping
19:44 - Subdomain Enumeration (TGPT & Assetfinder)
21:37 - Whois & DNS Lookups
25:00 - IP Tracing (IP2Location & Grabify)
30:00 - CEH v13 Exam Tips & Summary
βββββββββββββββββββββββ
π SUBSCRIBE for weekly cybersecurity tutorials:
π Like if this helped you β it keeps the channel going!
π¬ Comment your questions below β I read every one!
βββββββββββββββββββββββ
β οΈ DISCLAIMER: All techniques shown are for educational purposes only. Always get written permission before testing any system. Unauthorized access is illegal.
#CEHv13 #EthicalHacking #Footprinting #Reconnaissance #CyberSecurity #OSINT #GoogleDorks #Shodan #PenTesting #ShieldSpectrum
In this CEH v13 complete tutorial, I break down exactly how ethical hackers gather intelligence on any target β using Google Dorks, Shodan, OSINT tools, DNS Dumpster, Assetfinder, and AI-powered recon techniques. Step-by-step. No fluff.
Whether you're preparing for the CEH v13 exam or building real-world penetration testing skills, this video covers everything you need to master the first phase of ethical hacking.
βββββββββββββββββββββββ
π‘οΈ WHAT YOU'LL LEARN:
βββββββββββββββββββββββ
β Passive vs Active Reconnaissance (difference & when to use each)
β Advanced Google Dorking + AI-assisted dork generation
β Shodan β finding exposed cameras, servers & admin panels
β OSINT tools: Wayback Machine, Spokeo, OpenCorporates
β Subdomain enumeration with Assetfinder & TGPT
β DNS Dumpster β mapping entire network infrastructure
β Whois & DNS lookups for target profiling
β IP tracing with IP2Location & Grabify
βββββββββββββββββββββββ
β±οΈ TIMESTAMPS:
βββββββββββββββββββββββ
00:00 - Introduction & Hook
00:40 - Ethical Use Disclaimer
02:00 - Footprinting Overview (Passive vs Active)
05:18 - Google Dorks & GHDB
07:15 - AI-Powered Dork Generation
08:45 - Shodan Deep Dive
12:00 - OSINT Services (Wayback, Spokeo, OpenCorporates)
17:03 - DNS Dumpster & Network Mapping
19:44 - Subdomain Enumeration (TGPT & Assetfinder)
21:37 - Whois & DNS Lookups
25:00 - IP Tracing (IP2Location & Grabify)
30:00 - CEH v13 Exam Tips & Summary
βββββββββββββββββββββββ
π SUBSCRIBE for weekly cybersecurity tutorials:
π Like if this helped you β it keeps the channel going!
π¬ Comment your questions below β I read every one!
βββββββββββββββββββββββ
β οΈ DISCLAIMER: All techniques shown are for educational purposes only. Always get written permission before testing any system. Unauthorized access is illegal.
#CEHv13 #EthicalHacking #Footprinting #Reconnaissance #CyberSecurity #OSINT #GoogleDorks #Shodan #PenTesting #ShieldSpectrum
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
695
Likes
24
Duration
35:25
Published
Feb 10, 2026
Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.