Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
64 views
94 pages
Module - 2 (Footprinting)
ceh
Uploaded by
pamukumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download
Save
Save Module - 2 (Footprinting) For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
0 ratings
0% found this document useful (0 votes)
64 views
94 pages
Module - 2 (Footprinting)
ceh
Uploaded by
pamukumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Carousel Previous
Carousel Next
Download
Save
Save Module - 2 (Footprinting) For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 94
Search
Fullscreen
Module 02 esd] . Presented by Professionals.Security News NEWS. Aaa MC bec Ear | Facebook a ‘treasure trove’ of BP 202 Personally Identifiable Information Facebook contains a “treasure trove" of personally identifiable information that hackers manage to get their hands on. Idetalled a concent | call “riend-mapping”, where an attacker can get further knowledge of ‘user's circle of friends; having accessed their account and posing es a trusted friend, they can ‘cause mayhem. This ean include requesting the transfer of funds and extortion. ‘Asked why Facebook sso important to hackers, Imperve senior cecurity strategict Noa Bor-Voset sald: “People also add work friends on Facebook so a team leader can be ident:fied and this can lead ‘to corporate data baing accessed, project work being discussed openly, while gec-location data can be tailed for military intelligence. eep://anowsemogazineu.com pe ee eeFootprinting Terminology What Is Footprinting? Objectives of Footprinting Footprinting Threats Footprinting through Search Engines =, Website Footprinting Email Footprinting Competit e Intelligence Footprinting Using Google | re WHOIS Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting through Social Networking Sites Footprinting Tools Footprinting Countermeasures Footprinting Pen Testing tenModule Flow Ca] Footprinting Concepts Footprinting Threats H Footprinting H] Methodology Footprinting Footprinting Counter- measures Footprinting Tools Penetration Testing Ce en eee toedFootprinting et duel Open Source or Passive Information Gathering Collect information about a target from the publicly accessible sources Anonymous Footprinting Gather information from sources where the author of the information cannot be identified or traced Organizational or Private Footprinting Collect Information from an organization's web-based calendar and email services Active Information Gathering Gather information through social engineering on-site visits, interviews, and questionnaires Pseudonymous Footprinting Collect information that might be published under a different name in an attempt to preserve privacy Internet Footprinting Collect information about e target from the internet ns a 5h aWhat Is Footprinting? Footprinting is the process of g as much information as possible about a target network, for identifying various ways to intrude into an = i [ e Collect baste Gen about res I =) @ Determine the operating system used, platforms running, web the target and its network Eo e server versions, ete eeeWhy Footprinting? 3 Know Reduce Build Information Draw Security Posture Attack Area Database Network Map eee ed ce ea Tea eee coy Cee ee ied Poe eke ati Bea ees een eta Sees Sea address, networks, Sec Dee Cre a cay Pens Cee re ee ec Fe ao Pee Cs Cea ata See Be eu ers Cec bce eae eau ie!Cee od eed eo eee ree reso Seo’ el Era eee Teer ed eee= & Ansloe/ gil User and Group Names Telephone Numbers a reward we Senices Neborking 7 | P| rota rate Webs } ween | — ere a = Ads pasa — eee oe Organization's Website Ps ee we) ye LG =B ewe ide) eae Ba Press Releases ofthe Organization Phone Numbers Erwioyee Details syRer manners ing og Remote system Type seater “Architecture la Lee Routing ss Web Server Linke Locstion Dette ae Tables system NomeModule Flow C/EH Footprinting Concepts Footprinting Threats Footprinting Methodology Footprinting Footprinting Counter- measures Footprinting Tools Penetration Testing ee ete eee ee eee aeFootprinting Threats Wi Attackers gather valuable system and network information such as account details, operating system and installed applications, network components, server names, database schema details, etc. from footprinting techniques Types of Threats aa Privacy | Corporate | Business panes Leakage Loss l Espionage IK Loss Information eeeModule Flow (qi | Footprinting Concepts Footprinting Threats Footprinting Methodology Footprinting Footprinting Penetration Counter- Testing measures Footprinting Tools ee ete Le ee eee ceeye Meee urd gre at leer M et ees Peer ee Footprinting Methodology ala Pers nn DNs i] Dees ard ee cciet eee eee) nee cit tice eet call Cee eee eeeFootprinting through Attackers use search engines to extract information about a target such as technology platforms, employee details, login pages, intranet portals, etc. which helps in performing social engineering and other types of advanced system attacks Search engine cache may provide sensitive information that has been removed from the World Wide Web (WWW) Gee ren oeFinding Company’s © Search for the target company’s external URL in a search engine such as Google or Bing ©@ Internal URLs provide an insight into different departments and business units in an organization ©@ You may find an internal company’s URL by trial and error method Tools to Search Internal URLs hetp://news .neteraft.com http://www webmaster-a.com/ Link-extractor-intemnal .php err Al Internal URL’s of microsoft.com oe ere cee = steerer or = - oer ——— wednte-microsatticom 9 cestmer-microcarticon a windows microsoft.comPublic and Restricted Websites Identify a company’s private and public websites ee er up: {fewnv.microsoft.com ‘new once micosoR com ep fonswers miesorecom Public Website J |Collect LocationInformation C|EH eee annotate tematic | Googe | Ce ee eeesrmation about an individual can be | thepeopie search retina te oR found at various people search information about a person: websites © Residential addresses and email addresses © Contect numbers and date of bith ¢— , @. Photes and social nefrey Ererptles © Blog uals |e © Satelite pictures of private residencies a =e | ae 5 a me au =n : q " : A - os =a #en> A i 4 an msn —a ——S : J | “hte:/foiptcom Tat ew spokeo com AltR tezerved, Reproduction i Strictly Prohibited.People Search ing) Zaba Search ee tt hcbescarcscom Fa a6, Zoominfo ) PeekYou Fh ,rensrereonteocon =e) rae Wink People Search stp /pvnecom ‘AnyWho @ ) — PeopleSmart bipyAmascpsho.com | ftp /A.peplesmartcom ft People Lookup ‘httpsi//wwrm.peoplelookup.com 123 People Search tto.//ew.1230c00ke.com Intelius tp /foe nteliuscom WhitePages ttp://ewneabitepages.com enedPeople Search on ‘nttn:/fuwnw. Facebook.com ‘htto://orwdinkedia.com hites/feviticncom ‘httos //plus.google.com copynghe © PeGather Information from (la ee eee toeFootprinting through laa EY ren pathercompany’s infrestructure details from b ti ‘emmesps _‘job postings Look for these: Job requirements Employee’: profile 2 Hardware information Software information Examples of Job Websites hetp://uwu.monstercom hip: /orwvesuroarbiider oer oa http://wwwcdice.com http://www. simplyhired.com 64) hetp://www.indeed.com http://www.usajobs.cov eee reTarget Using Alerts Alerts are the content monitoring services Examples of Alert Services that provide up-to-date information based on your preference usually via email or © Google Alerts - tpn google com/alets SMS in an automated manner © Yahoo! Alerts -http://alerts yahoo.com ) © Giga Alert - http://www gigaalert.com a Google aiers Seach query: Securty News CeeFootprinting IViethodology at [amencnr aie nner ie Pee Nees tt Mea ahr DNS Footprinting eras Dearie’ eee rea ett eee acu d Coe ee ated om ee ee eeda Website Footprinting a] Information obtained from target’s website enables an attacker to build a detailed map of website’s structure and architecture Browsing the target website may provide: © Software used its version. < Operating system used © Sub-directories and parameters Filename, path, database field name, or query © Scripting platform Contact details and CMs details Use Zaproxy, Burp Suite, Firebug, etc, to view headers that provide: © Connection status and content-type Accept-Ranges = Last Modified information X-Powered-By information = Web server in use and its version itp://portswigg TT Le eeFootprinting (Gont’d) Examining HTML source provides: Examining cookies may = © Comments in the source code © Software in use and its behavior c ts in th cs eH» e Contact details of web developer or admin | pla Rpaaniarichite — ao saree é | eeMirroring Entire Website | C/EH Mirroring an entire website onto the local system enables an attacker to dissect and identify vulnerabilities; it also assists in finding directory structure and other valuable information without multiple requests to web server Mirrored Website Sr eeeWebsite Mirroring Tools CIE Donte //urwm:surfoffline.com) \WebRipper (nttp:/Avww.calluna-software.com) IL All Rights Reserved. Reproduction is Strictly Prohibited.Tools (Cont'd) Website Ripper Copier PageNest pwn tensons.com fee /rowsepogenest.com uid! Teleport Pro Backstreet Browser ae) leper Bowe toe =. Portable Offline Browser "Offline Explorer Enterprise K D) rrinincroaticon ERD icevtrmmtanednccon Proxy Offline Browser GNU Wget BN itis estniprony aiiintr nesses tit http//wuwgnuorg Hooeey Webprint ttp://unnvhoceeywebprint.com iMiser bties//internetrescarchtocleom peeExtract Website Information from Website Information eet All Fights Reserved, Reproduction is Strictly Prohibited.Monitoring Web Updates Website Watcher eestewaere 2012/23 eden Alesis ‘ttp:/faignes.comFootprinting Viethodology ee eel ue cae Engines Mee oteT) Email Footprinting Competitive Intelligence Cee Tac Cala DOr uu DN Deen urd Ree nee at auc eet oie ety cities Se Ce eee ee een‘@ Attacker tracks email to gather information about the physical location of an individual to perform social engineering that in turn may help in mapping target organization’s network ‘@ Email tracking is a method to monitor and spy on the delivered emails to the intended recipient ‘When the email was fe received and read GPS location and map of the recipient ‘Time spent on rea the emails Set messages to expire after a specified time Track PDF and other types of attachments Whether or not the recipient visited any links sent to them CaerCollecting Information from clEH Email Header eat ada The address from which the message was sent p sionates Sendarsmalisenan) . (ate end time raceived bythe orzinetr's eal servers Ruthanticationsyrtem pects tron:to ‘unique umber assigned by rmzocele-cormt Menelythe message ee eee eedEmail Lookup - Free Emall Tracker mttaer Aransis eWallfrackerPr (itpi//nunncemaitrockerro.com) PoliteMail (http://www poltemail.com)Tools (Cont'd) Pointofmail ‘xp /fo potatofrnat. com Read Notify -:/Aumau react com Super Email Marketing Software | it://snw-bll email marketing sofowerenet | DidTheyReadit | | http://wwwadidtheyreadit.com WhoReadMe nto://vhoreodme.com Trace Email ‘nex /Auhaismytoateresscom MSGTAG GetNotify ttox/rowwrmegtog.com ttp:/;wgetnctifycom Zendio G-Lock Analytics btto://vewv.zendiowcon to /alockanaitiescom tosFootprinting iethodology fais Oars ca DNS unig Merete rd Email Footprinting Deas Lr Pema genet ces eer) eee cated Peers ue {Saas , Ge eee acdCompetitive Intelligence Gathering Q @ Competitive intelligence is the process of identifying, gathering, analyzing, verifying, and using information about your competitors from resources such as the Internet & Competitive intelligence is non-interfering and subtle in nature Sources of Competitive Intelligence 1 Company websites and employment ads © Social engineering employees 2) Search engines, intemet, and online databases, 7 Product catalogues and retail outlets 3) Press roteases and annual reports 8) Analyst and regulatory reports (Ap eto canteen, Peer (2p) eetone ant venoms (8) Piet ond vemat | (49) Hee stint eae: 1° by F6-Comcil allmughts Racerved, Reproduction Strictly Prohibited.Competitive Intelligence - 2 Visit These Sites When did it begin? eee eee i 01. EDGAR Database http://www.sec.gov/edgarshtml Sea 02. Hoovers i Cc ° i Whereisit 1) \__ How did it http://www.hoovers.com located? “7 ( Company FP" develop? a i ‘cS oO H 03. LexisNexis —— em http://worwlexisnexis.com 04. Business Wire i DO Who leads it? http://wwrw.businesswire.com Crs re SeeCompetitive Intelligence - v €Rq/<1<1¢ 2 Market Watch (htep://www.marketwatch.com) The Wall Street Transcript (http://www.twst.com) Lipper Marketplace (http://www lippermarketplace.com) Euromonitor (hitp://Avww.euromonitor.com) Fagan Finder (http://Awww.faganfinder.com) SEC Info (htzp://Awww.secinfo.com) The Search Monitor (http://www.thesearchmonitor.com) parry Competitive Intelligence Sites Market Wfatch twst.com Cena Seexeam Fagan \FinderCompetitive Intelligence - What Expert aa" Opinions Say About the Company 2 ben Cea ous Da cau Cee a ed http://wwew.copernic.com ABI/INFORM Global Cet eee esd ce Dee) ee ee) Pte De ee ee BT cs De er RL Ania erin eda eneFootprinting Viethodology C/EH Pee ue ey SUOG ema raiy Wehr Dts const ania Nea as ; ; Becca er (ee re ad leona eeu eee eee eee ee ee eeeFootprint Using Google Hacking CEH Techniques oo pes ae tec acd Drees sa as Ceca Ey Boon Reo Bees 4 Qe cae Sa Cee Pm RM cay Roc eee ee ee eee eeWhat a Hacker can do with Google Hacking? coo ree Bele Cae-clueH Pea een eee Datla Bete Go i ag Seay ieee Tata Poet Rn directories Cece eee Ce eeeae Google supports several advanced operators that help in modifying the search Ser res [eaiaticoedeeel ¢& Restricts the results to those websites in the given domai [uisuusnestiess| Pens fatima tal Pee eC eee ee acy eeUsing Google Advance Operator [intitle:intranet inurl:intranet +intext:”human resources”): The above combination of the Google advanced search operators allows you to access a target company’s private network and collect sensitive information such as employee listings, key contact details, etc. that can be incredibly useful for any social ‘engineering endeavor Copyright © by’Google Hacking Tool: Google Hacking Database (GHDB) Pes kha pe Ce ae eee cea eee aaMetaGoofil ‘upsfwvnaedge-security.com Goolink Scanner ‘ttp://ewrw-ghacks.net SiteDigger rtps/fuainu mcafee carn Google Hacks ‘nte://eodeacoalecora BILE Suite ttpx//uwnu.sencepost.com Cony ee Google Hack Honeypot ins/fobn sourceforge net GMapCatcher http://code.google.com SearchDiggity rps fous stochlicom Google HACK DB tte://ewseepeinticorn Gooscan tips ene darknetorg.uk ction is Strictly ProhibitedFootprinting IViethodology C/EH ed Vereen gras ea Ten ters eed ce curacy eter eee eel eS ee ela reer DIS tia Network Footprinting een sete erie ent ee a cet es seta a eee oeat WHOIS databases are maintained by and contain the WHOIS query returns: Information obtained Regional Internet from WHOIS database Registries (RIRs) Domain name details ncaiats aw atteckor ti Contact details of domain Create detailed map of aFRINich =—AREN arte’ organizational network Domain name servers eee eee a ene that aslsts t0 perform socal @apnic| () ee ee ee engineerin created . 8 Expiry recor Records last updated Gather other internal network details, etc. Cea ee eee aeGW WHOIS Lookup Ff EH hhttp://whois.domaintools.com hnttpi//centralopa.net/co ete enWHOIS Lookup Tool: (ai | Pe Sse ] v Bi@-%-O BsBe& ee net] Dea mms Se Naat Deut) psa 3 od Peete ani) rel tay As Si ed ee Ue Deere ned See ue Bateau ee Eee eee Sao eee eee arCountryWhois itps//uamu-toros corn Whols Analyzer Pro tte:/ Am asboisanalyze.com LanWhols ‘tes Manticks corn HotWhois ttp://rwnntiolsofucom 4 7 Batch IP Converter Whois 2010 Pro BE rypnunesotmesicn tp Popshiecom Beg CallerIP ActiveWhois Peet) Atto://amw.callerippvo.com i _ WhoisThisDomain bttp:/pnirsefnet Whols Lookup Multiple | Addresses heise eeeWHOIS Lookup SmartWhois ‘tto://smartwhoi.com Better Whois ten://ow.betterwhots.com Whois Source ttox//usmuhoisse Web Wiz ‘ook shel Tookup htm Network-Tools.com ‘tto://network-toolscom ttos//ueow eb co.uk/ domain Whois itp fools whcisnat DNSstuff eeo://ovnu dosstufcom Network Solutions Whois http fru networksolutions.com WebToolHub ttp://ewnw.vebtoelhub com/tn56133 Eithols-fookup asp» Ultra Tools ttpes//wwnmultratookecom/whoie/homeFootprinting Methodology ala emer fee M td Pee a cr eee attic ake ie Pras uu Ds rd Deen ry een et eer eee Peace ee een eee eeee 2 Attacker can gather DNS information to determine key hosts in the network and can perform social engineering attacks 2 @ DNS records provide important information about location and type of servers DNS Interrogation Tools a) = Description | Bind © http://www.dnsstuff.com | WOK Peis to dams’ ma cer © http://networktools.com SOR nat ivory or domain — eee | && CF Response penn ‘ | | nto tattoo eerie CU ye nd err Al ights reyExtracting DNS Information (Cont'd) This toa is very use to perform a DNS query on any hort. Each domin are (Example: dnsqueries.com) is structured in hosts (ex (queries. com) andthe DNS (Domain Name System) alow Y to translate the domain name or te hostname in sn IP Across corresponding te a to implomontate typos of NS record uh 36 8 record, MDX, AAAA, CNAME and SOA, Host ™m ticrosofu.com 2/3381 cal Glass Type ‘esp include: spf a. microsoft.com i mievroft.com 2) 2281 rer Linleesott pais tieoeoh.com 2) 2281 10 mail moseaging microsof.com 3 imiereottcom ©) 281 microsoft.com ©) 2381 A Seana microsoft.com 3) 351 65.5558.201 ricrosot.com o) 141521 microson.com ©} 141538 wt tmlcosof.comic) 141531 WL e2neno stamst.nt 3) ash. tictosof.com: nel sft FLUFCODRE-Avt nig BH IZ UsEvOLOUEIQDRGO/ VON aa @ Perform ONS query Houtame: Types ame Rum tools Detats ReaD SPs abd pt csmierotft com inca: op erg Limbresotecom paris 107.115.205 UTIT.ADT 115.214 Ipee205 248,108.04 par208 248,108.20, fetal. oot mrbat.nerveft.com 2012071603 200 6 2419200 3600 en ee eee embic Ge DNSWatch \ tated foumekotenet Gy) inmate myDNSTools DomainTools @) hao nydostool ine items domcintaolcom Professional Toolset "| DNs J Ii/Ao dso fy ued a DNS Records “Sky DNS Lookup Too! p/n telecom U Sit/mmanctccoahk | ‘| DNsData View / DNS Query Utility Bed evince nt $4) eae niaFootprinting Methodology (ata eect act keri ie aes WHOIS Footprinting DSi Network Footprinting Se se eC oscars Ce ee eed7 Locate the cE \@ Network range information obtained assists an attacker to create a map of the target’s network ‘@ Find the range of IP addresses using ARIN whois database search tool © You can find the range of IP addresses and the subnet mask used by the target ation from Regional Internet orga Registry (RIR) Network Whois Record Queried whois.arin.nct vith "a 207.46.292.162" detRance: 207.46.0.0 - 207.46.255.255 cia: 207.46.0.0/25, Origins: MICROSOFT-GLOSAL-WET NET-207-0-0-0-0 Dixect Asesqament NS2.MSET.NET NSé IMSer NEE NS1MSET.NET NSS (MSET NET 1997-03-91 2004-12-05 etp: //wnois.arin.net/rest/net/wer~ Microsoét Comp srr Ine Microsoft Way Redmond 1990-07-20 2003-11-10 Bttp: //whoss arin nst/rest/org/MSET ‘ABUSE231-2RIW ‘abuse abuseghotmail.comaDYelcovaeabbat-mail-) C\/EH Duce etDetermine the C/EH (Cont’d) ou) eset naw you find specific computers (rout servers, etc.) using a variety of filters Ey EXPOSE ONLINE DEVICES. ey eae) Copyright © by eee eae gaaTraceroute programs work on the concept of ICMP protocol and use the TTL field in the header of ICMP packets to discover the routers on the path to a target host IP Source Router Hop Router Hop Router Hop Destination Host ICMP Echo request m3, e4a Traceroute @ Attackers conduct traceroute to extract information about: network topology, trusted routers, and firewall locations © For example: after running several traceroutes, an attacker might obtain the following information: ‘traceroute 1.10,10.20, second to last hop is 1.10.10.1 traceroute 1.10.20.10, third to lest hop is 1.10.10.1 ‘traceroute 1.10,20.10, second to last hop is 1.10.10.50 traceroute 1.10.20.15, third to last hop is 1.10.10.1 © traceroute 1.10.20.15, second to last hop is 1.10.10.60 © By putting this information together, attackers can draw the network diagram. RERERREREEEEEEELEA 130303Traceroute C\EH eae eee faa a | {2Traceroute (Cont'd) Network Pinger i Magic NetTrace te: wma: netsorpinger om GXy Mor pnnetictopcom GEOSpider ‘tos fas orewraescom vTrace tte: ftrace ph Trout ites//vemwwmcafe.corn > ee F bttoy//umusoechiunet Roadkil’s Trace Route i & 2 | ere 3D Traceroute heep/ fourm ddtrde AnalogX HyperTrace ttp:/fonw.analog.corm Network Systems Traceroute etp://rewaunctprincetonedu Ping Plotter etp:/poos-pingpleter.com eeFootprinting Methodology C/EH Pee eu ee aes WHO'S Footprinting Des Ly DNS aurd gre aa Network Footprinting ae nearer Tee Cec er secur une niet ee sa eee eeFootprinting through Social Engineering © @ Social engineering is the art of convincing people to reveal confidential information © Social engineers depend on the fact that people are unawere of their [_ __ Valuable information and are careless about protecting it @ C Social engineers attempt to gather: Social engineers use these techniques: anes Shoulder surfing © Credit card details and cacial security Q © Eavesdropping ‘© Usernames and passwords = © Other personal information a ae ane Sint e © Impersonation on social networking Operating systems and software = e versions = gs ‘s elec eeeiheraes prec dae iit ix @ oS @Collect Information Using , and Eavesdropping Shoulder Surfing © Eavesdropping is unauthorized © Shoulder surfing is the procedure listening of conversations or where the attackers look over reading of messages the user's shoulder to gain © Itis interception of any form of critical information communication such as audio, © Attackers gather information such video, or written as passwords, personal identification number, account numbers, credit card information, etc. Dumpster Dumpster diving is looking for ‘treasure in someone else's trash Itinvolves collection of phone bills, contact information, financial information, operations ‘elated information, etc. from the target company’s trash bins, printer trash bins, user desk for sticky notes, etc. © eryFootprinting Methodology Cal Peete aie ake ced Ween anne era lee eae et WHOIS Footprinting Dra ui Da gras ca Re eree eeeelD st acs eer Se ae ee eedCollect Information through Social Engineering on Attackers gather sensitive Information through social engineering on social ~ networking websites such as Facebook, MySpace, Linkedin, Twitter, | ( Pintarest, Googles, etc. a Attackers create a fake profile on social networking, identity to lure the employees to give up ERplByEEE Way post personal information such as date of birth, educational and ‘employment backgrounds, spouses names, etc. and information about thelr company such a5 potential clients and business partners, trade secrets of businass, websites, company’s upcoming news, mergers, acquisitions, atc, Using the details of an employee of the target organization, an attacker can 8 compromise a secured facility eenInformation Available on Social Networking Sites @ Mg Mera gee Cds Mees Aue oo Ce dae ee Coe Tce} ier Ce ee eedCollecting Information | C/EH Chae @) |) using Facebook alll over the world 845 95" | 100 8,8) 250 26 1/5 ee 20 @ 6°S oy ! million monthly | billion million photos active users connections uploaded daily LofeverySof | minutes time all page views | spent per visit ey eensCollecting Twitter Information pay es 29.9 million 107.7 million = 9 Indonesia Beal 19.5 million 33.3 million %, eo "0. io Sc o entries with argest = ° = 465 million accounts hi 16% 32% Twitter users now post status updates UK, Q Wayne Rooney 23.8 million see Japan coo 350 od million tweets a day 55% 8 Twitter users access the platform via their mobile Ce ee eae ee eee eee)Collecting Linkedin Information PRM CR ko (2 dee ee Us new members million million companies join every second employees located revenue for 2011 have Linkedin around the world company pages er nL ee eee cae eeCollecting Pb WGermuiket ete 3rd | Most visited website oS 900 | average time users spend according to Alexa Sec | on YouTube every day — > ] 2 billion | Views per day 1/10 | One of every 10 Internet users opens YouTube 829,440 | videos uploaded every dayon Social Networking Sites © Users may use fake identities on social networking sites. Attackers use tools such as Get Someones IP or IP-GRABBER to track users’ real identity | Steps to get someone's IP address through chat on Facebook using Get Someones IP tool: © Goto ntep://waw.uyiptest.con/sta © Three fields exict: (neneeeeameent ana Copy the generated link of, Enter any URL you want Open the URL in this field this field and send it to the the target to redirect to and keep checking for ‘targat via chat to get IP target's IP address np ete ray ih gets eet eee || Atto://www.myiptest.com ReproductiModule Flow C\EH Footprinting Concepts Footprinting Threats Footprinting H] Methodology Footprinting Footprinting Counter- measures Footprinting Tools Penetration TestingFootprinting Tool: Vialtego Maltego is a program that can be used to determine the relationships and real world links between people, groups of people (social networks), companies, organizations, websites, Internet infrastructure, phrases, documents, and files Internet Dom: hetp://unoa paterva com 5 ‘EGOFootprinting Tool: Setting Wit n oe omain Name \nformatio ; Oo — : sp: domeinpunch.comFootprinting Tool: Extract targeted company contact data (email, phone, fax) from web for responsible b2b communication © Extract URL, meta tag (title, description, keyword) for website promotion, search directory creation, web research Phone Numbers eePrefix Whols ‘to-Zewhots.or9 tt: /puwunatscantook.com a Te ND RS ennnes Autonomous System Scanner (ASS) tx/oweaenoetw.or9 | | ea NetScanTools Pro tor/owwrsdiggercom fad DNS DIGGER Netmask tte //ranohenoelteusora Binging stp: pau big com Spiderzilla It /filerite.mosdevorg Sam Spade eep /pimeumajergeeks com Robtex ttp://wnvratexcom All RightsTools Corsi) SpiderFoot httes//avembinarypoo.cor Dig Web Interface http://www.digwebinterface.com Zaba Search tt://wrn:cabasearch.com ActiveWhois tie:/fauriohore.com GeoTrace Domain Research Tool CallerIP ntip:/fuuons domainresearchtocl.com tts//wnewscalerippro.cam yoName ‘http://yoname.com ttp://mvn.nabber.org Ping-Probe (_ Domaintostingview s/f pg probe com ep fen bof net Hi & = &Module Flow C/EH Footprinting Concepts Footprinting Threats Footprinting Methodology Footprinting Footprinting Counter- measures Footprinting Tools Penetration Testing Ce ee tee eeeFootprinting Countermeasures Configure routers to restrict the responses to footprinting requests Lock the ports with the eultable firewall configuration Evaluate and limit the amount of information available before publishing it on the website/ Internet and disable the unnecessary ser Prevent cearch engines from exching a web page and use anonymous registration 9 Configure web servers to avoid information leakage and dizable unwanted protocols Use an IDS that can be configured to refuse suspicious traffic and pick up footprinting patterns Perform footprinting techniques and remove any sei information found Enforce eecurity policies to regulate the information that employees can reveal to third partiesFootprinting Countermeasures (Cont'd) Disable directory listings and use split-DNS. | | YY Educate employees about various social engineering tricks and risks on Y_Pesecunapected inpu suchas [<> WZ rach © by EModule Flow C/EH Footprinting Methodology Footprinting Threats Footprinting Concepts _ = @ Footprinting Footprinting Counter- measures Footprinting Tools Penetration Testing Nene ee ee© Footprinting pen testis used to determine organization’ publicly available information on the Internet such as network architecture, operating systems, applications, and! users © The tester attempts to gather as much information as possible about the target organization from the Internet and other publicly accessible sources 4 " Footprinting pen go | tprinting p Prevent information leakage testing helps administrator to: Prevent DNS record retrieval from publically available servers Prevent social engineering attemptsFootprinting Pen Testing (Corse) © START ¥ oa author v Define the scope of the assessment Use search engines "> suchas Google, Yahoo! Search, Bing, ete v = Use tools such as Perform website > ligarse footprinting 7 SS © Get proper authorization and define the scope of the assessment © Footprint search engines such as Google, Yahoo! Search, Ask, Bing, Dogpile, etc. to gather target organization's information such as employee details, login pages, Intranet portals, ete. that helps in performing social engineering and other types of advanced system attacks © Perform website footprinting using tools such as HTTrack Web Site Cop! BlackWidow, Webripper, etc. to build a detailed map of website's structure and architecture. eeeFootprinting Pen Testing (Cont'd) Use tools such as Perform email “> elMailfrackerPro, footprinting PoliteMail, etc. v Use tools such as Gather competitive its Intelligence Businazs Wire, te v Perform Googie Use tools such as GHDB, hacl aol Perform WHOIS footprinting Use tools such as WHOIS Lookup, SmartWheis, etc. e > Copynght © by £6 MetaGoofil, SiteDizgcr, ete. Perform email footprinting using tools such as eMailTrackerPro, PoliteMail, Email Lookup ~ Free Email Tracker, ctc. to gather information about the physical location of an individual to perform social engineering that in turn may help in. mapping target organization's network Gather compatitive intelligence using tools such as Hoovers, LexisNexis, Business Wire, ete. Perform Google hacking using tools such as GHDB, MataGoofil, SiteDiggar, etc. Perform WHOIS footprinting using tools such as WHOIS Lookup, SmartWhols, etc to cracte detailed map of organizational network, to gather personal information that assists to perform social engineering, and to gather other internal network details, ete. I all eghts Reserved. Repreducto aePerform DNS footprinting Use tools such as DIG, NSLookup ete, ree beriomnatwort|..|..» apagertg wae ie oe Petomserl a)...» Dosminnsoast Sra ery ‘ Perform footprinting through cocial networking zitez v peste erin Create a falce identity on > social networking sites such as Facebook, Linkedin, etc. ——) Cea Po Perform DNS footprinting using tools such as DIG, NsLookup, DNS Records, atc. to determine key hosts in the network and perform social engineering attacks Perform network footprinting using tool such as Path Analyzer Pro, VisualRoute 2010, Network Pinger, etc. to create a | map of the targat’s network Implement social engineering techniques such as eavesdropping, shoulder surfing, and dumpster diving that may help to gather more critical information about the target organization Gather target organization employees information from their personal profiles fon social networking sites such as, Facebook, Linkedin, Twitter, Google+, Pinterest, etc. that assist to perform social engineering At the end of pen testing document all the findings eeeFootprinting Pen Testing Report Templates ere eie niet erie eons ao ee Pere 1B Technology patiorme: ear Dt? Peo eet Pt eeccs Peres cos Tree CUS act ees ees C ereenteeecr Paes 4154 ee ee et Pes coer aco Paco eos eect ters Pee een’ Pete eee Pees De ee nea en ae ees ee cs Pe ems es Cee eee eeeent eons a cee Coe eee eet eer Cees coo Information obtained through DNS footorinting [mee es Dee ae eee ers Peer Percent Pr Popes aor Footprinting Pen Testing Report Templates (Conra) afi DNS Re ec aa ened Sens Ce on nd Sere ey Cee eas Ase Coy Information obtained through social networking sites een Ronee aad Ce es Educational and employment backgrounds: co Ce ee ee eeeModule Summary TE Footprinting is the process of collecting as much information as possible about a target network, for identifying various ways to intrude into an organization’s network system 1 Itreduces attacker's attack area to specific range of IP address, networks, domain names, remote access, etc. 1 Attackers use search engines to extract information about a target Information obtained from target’s website enables an attacker to build a detailed map of website's structure and architecture O Competitive intelligence is the process of identifying, gathering, analyzing, verifying, and using information about your competitors from resources such as the Internet DNS records provide important inform: n about location and type of servers (1 Attackers conduct traceroute to extract information about: network topology, trusted routers, and firewall locations Attackers gather sensitive information through social engineering on social networking websites such as Facebook, MySpace, Linkedin, Twitter, Pinterest, Google+, etc. eee enn eee ce
You might also like
Cisco CCNA Lab Guide
PDF
90% (10)
Cisco CCNA Lab Guide
356 pages
Speedy Notes - Information Gathering
PDF
No ratings yet
Speedy Notes - Information Gathering
9 pages
Ethical Hacking Lab
PDF
100% (2)
Ethical Hacking Lab
146 pages
Footprinting
PDF
No ratings yet
Footprinting
29 pages
Foot Printing
PDF
No ratings yet
Foot Printing
4 pages
CEH v7.2
PDF
No ratings yet
CEH v7.2
203 pages
Footprinting
PDF
No ratings yet
Footprinting
43 pages
Lecture 3 Reconnaisance
PDF
No ratings yet
Lecture 3 Reconnaisance
36 pages
2 - Footprinting and Reconnaissance PDF
PDF
100% (1)
2 - Footprinting and Reconnaissance PDF
45 pages
Module 02 Footprinting and Reconnaissance
PDF
No ratings yet
Module 02 Footprinting and Reconnaissance
58 pages
Lab 4 Reconnaissance
PDF
No ratings yet
Lab 4 Reconnaissance
19 pages
Week5 2023
PDF
No ratings yet
Week5 2023
40 pages
Unit 2 Ethical Hacking
PDF
No ratings yet
Unit 2 Ethical Hacking
17 pages
CEH v7.2 Study Guide Hacker U
PDF
No ratings yet
CEH v7.2 Study Guide Hacker U
204 pages
Unit No. 2 Part1 Footprinting
PDF
No ratings yet
Unit No. 2 Part1 Footprinting
109 pages
2.different Ways of Footprinting
PDF
No ratings yet
2.different Ways of Footprinting
10 pages
What Is Footprinting
PDF
No ratings yet
What Is Footprinting
5 pages
Ethical Hacking and Intrusion Detection/ Forensics: Instructor: Dr. Avinash Srinivasan Module-2 Chapter-2
PDF
No ratings yet
Ethical Hacking and Intrusion Detection/ Forensics: Instructor: Dr. Avinash Srinivasan Module-2 Chapter-2
66 pages
Hands-On Ethical Hacking and Network Defense
PDF
No ratings yet
Hands-On Ethical Hacking and Network Defense
47 pages
CH 2-Footprinting
PDF
No ratings yet
CH 2-Footprinting
54 pages
Hacking Exposed 7: Network Security Secrets & Solutions
PDF
No ratings yet
Hacking Exposed 7: Network Security Secrets & Solutions
38 pages
Kali Linuix
PDF
No ratings yet
Kali Linuix
145 pages
Ethical Hacking LEC-3
PDF
No ratings yet
Ethical Hacking LEC-3
31 pages
Module 8 Network Penetration Testing
PDF
No ratings yet
Module 8 Network Penetration Testing
147 pages
2.footprinting - Scanning
PDF
No ratings yet
2.footprinting - Scanning
10 pages
Footprinting and Information Gathering
PDF
No ratings yet
Footprinting and Information Gathering
8 pages
Chapter 2
PDF
No ratings yet
Chapter 2
40 pages
CH 04
PDF
No ratings yet
CH 04
25 pages
Footprinting Combined
PDF
No ratings yet
Footprinting Combined
5 pages
Ethical Hacking Training
PDF
No ratings yet
Ethical Hacking Training
31 pages
CPT 03 Recon
PDF
No ratings yet
CPT 03 Recon
41 pages
2.footprinting and Reconnaissance
PDF
No ratings yet
2.footprinting and Reconnaissance
26 pages
Footprinting
PDF
No ratings yet
Footprinting
2 pages
Chapter 2: Gathering Target Information: Reconnaissance, Footprinting, and Social Engineering
PDF
No ratings yet
Chapter 2: Gathering Target Information: Reconnaissance, Footprinting, and Social Engineering
11 pages
2.FootPrinting Theory
PDF
No ratings yet
2.FootPrinting Theory
4 pages
Verzeo Minor Project
PDF
No ratings yet
Verzeo Minor Project
25 pages
Practical 2 Overview: Ethical Hacking: Footprinting Different Methods
PDF
No ratings yet
Practical 2 Overview: Ethical Hacking: Footprinting Different Methods
13 pages
KSI - Footprinting
PDF
No ratings yet
KSI - Footprinting
16 pages
Information Gathering Lecture
PDF
No ratings yet
Information Gathering Lecture
14 pages
2.footprinting and Reconnaissance
PDF
No ratings yet
2.footprinting and Reconnaissance
4 pages
CH 01
PDF
No ratings yet
CH 01
41 pages
CH 4 - Footprinting and Social Engineering
PDF
No ratings yet
CH 4 - Footprinting and Social Engineering
64 pages
CH 01
PDF
No ratings yet
CH 01
8 pages
Ethical Hacking Notes
PDF
No ratings yet
Ethical Hacking Notes
24 pages
ECC CEHv8
PDF
No ratings yet
ECC CEHv8
35 pages
ECH Guide by Shibs 30-June-2022
PDF
100% (2)
ECH Guide by Shibs 30-June-2022
107 pages
CH 01
PDF
No ratings yet
CH 01
41 pages
Footprinting and Reconnaissance
PDF
No ratings yet
Footprinting and Reconnaissance
5 pages
Footprinting and Reconnaissance
PDF
No ratings yet
Footprinting and Reconnaissance
66 pages
Footprinting and Reconnaissance
PDF
No ratings yet
Footprinting and Reconnaissance
20 pages
Foot Printing:: Footprinting Means Gathering Information About A Target System Which Can
PDF
No ratings yet
Foot Printing:: Footprinting Means Gathering Information About A Target System Which Can
18 pages
3.1. LECTURE PPT - Footprinting
PDF
No ratings yet
3.1. LECTURE PPT - Footprinting
15 pages
Unit 02 EH
PDF
No ratings yet
Unit 02 EH
51 pages
Methodology Footprinting&Scanning
PDF
No ratings yet
Methodology Footprinting&Scanning
55 pages
Footprinting and Reconnaissance
PDF
No ratings yet
Footprinting and Reconnaissance
17 pages
Chap 2 - CEH Course 2024
PDF
No ratings yet
Chap 2 - CEH Course 2024
27 pages
Lecture 6,7 Ethical Hacking Framework and Footprinting
PDF
No ratings yet
Lecture 6,7 Ethical Hacking Framework and Footprinting
16 pages
John Spence Rmv6tf Vfinal1
PDF
No ratings yet
John Spence Rmv6tf Vfinal1
29 pages
Hacking Presentation
PDF
No ratings yet
Hacking Presentation
14 pages
IOS Introduction
PDF
No ratings yet
IOS Introduction
2 pages
Netlabve Real Equipment Pod Management Guide PDF
PDF
No ratings yet
Netlabve Real Equipment Pod Management Guide PDF
120 pages
Implementing Selinux As Linux Security Module Report
PDF
No ratings yet
Implementing Selinux As Linux Security Module Report
58 pages