Footprinting and Information Gathering
Footprinting and Information Gathering
Footprinting and Information Gathering
Google Dorking leverages advanced search operators to uncover information that is not immediately
Technical Commands:
- filetype:pdf "financial report" - Finds PDF files containing the words "financial report".
- inurl:admin - Finds URLs containing "admin", which may indicate admin login pages.
Example Command:
This command searches for Excel files on example.com that contain the word "password" in their
Case Study:
In 2014, during the Sony Pictures hack, attackers used Google Dorking to find internal documents
that were accidentally indexed by Google. They searched for terms like site:sony.com filetype:doc
FTP search engines help locate files stored on public FTP servers, often finding backup files,
- NSEEK
- FileWatcher
Technical Commands:
Example Command:
Case Study:
Attackers used FTP search engines to find open FTP servers and downloaded backup files that
contained sensitive information. For instance, an open FTP server may have been found using
IoT search engines like Shodan and Censys are specialized for finding internet-connected devices.
- Shodan
- Censys
Shodan:
Example Command:
This command searches for devices using the default password on Telnet port 23, which often
Censys:
Example Command:
Footprinting and Information Gathering Using Search Engines
This command finds devices running HTTP services with Telnet protocol enabled.
Case Study:
In the 2016 Mirai botnet attack, attackers used Shodan to find vulnerable IoT devices with default
credentials. They used commands like shodan search "default password" port:23 to locate and
compromise these devices, eventually using them to launch a massive DDoS attack.
Footprinting and Information Gathering Using Search Engines
Social media and public databases can provide detailed information about individuals and
organizations, which can be used for spear-phishing and other targeted attacks.
LinkedIn:
- Use advanced search operators to find specific posts. For example, from:exampleuser
since:2021-01-01 until:2021-12-31 on Twitter to find posts from a specific user within a date range.
Public Databases:
- Use Google Dorking: site:pastebin.com "example.com" to find pastes related to a specific domain.
Example Command:
This command searches LinkedIn for profiles with the title "Software Engineer" at example.com,
Case Study:
Footprinting and Information Gathering Using Search Engines
In the 2013 Target data breach, attackers used LinkedIn to gather information about Target
employees. They identified key personnel and sent spear-phishing emails to gain access to the
network.
Footprinting and Information Gathering Using Search Engines
Attackers used a vulnerability in a web application to gain access to sensitive data. They likely used
Google Dorking to identify the vulnerable application by searching for specific error messages or
application versions.
Attackers used stolen credentials to access the database. They may have gathered information
An insider exploited a misconfigured web application firewall. Information about the misconfiguration
Attackers used advanced search techniques to find vulnerabilities in Adobe's web applications, likely
leveraging Google Dorking and other search tools to locate specific pages and scripts.