0% found this document useful (0 votes)
75 views16 pages

Lecture 6,7 Ethical Hacking Framework and Footprinting

Uploaded by

nikhilraval706
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
75 views16 pages

Lecture 6,7 Ethical Hacking Framework and Footprinting

Uploaded by

nikhilraval706
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

3CS204ME24

Ethical Hacking and Vulnerability


Assessment
Foot printing and Reconnaissance
• Footpringing Concepts
• Footpringing Methodologies/Techniques
• Footpringing Tools
• Footprinting countermeasures
Footprinting
• Collecting information about organization to identify various ways to
intrude the into systems.
• Objectives
• Security postures
• Identifying level of Risk
• Reduction of focus areas
• Identifying vulnerabilities
• Drawing network map

• Active Footprinting –Target is aware about information gathering


• Passive Footprinting- Target is not aware about it.
Passive Footprinting Technique Description
Search Engine Queries Use search engines and Google Dorking to
find specific information.
Publicly Available Information Gather data from company websites, social
media, press releases, etc.
Whois Lookup Obtain domain registration details, including
owner, contact info, and DNS data.
DNS Interrogation Perform DNS lookups and reverse DNS
lookups to gather domain and IP info.
Public Code Repositories Explore public repositories like GitHub for
exposed code, credentials, or data.
PF Publicly Accessible Documents Extract metadata from publicly available
documents for additional details.
Techniques Social Engineering (Indirect Methods) Monitor forums, social media, and
community spaces for leaked information.
Public Network Information Analyze BGP and ASN data, and use tools like
Shodan for network intelligence.
Website Analysis Examine website source code and archived
versions for hidden or historical info.
Job Postings Analyze job listings for insights into the
target's technology stack and structure.
Competitive Intelligence Tools Use tools like Hoovers or Bloomberg to
gather financial and market data.
Public Forums and Mailing Lists Monitor discussions where employees may
reveal technical or organizational info.
Active Footprinting Technique Description
Scanning a target’s network to identify
Port Scanning
open ports and running services.
Identifying live hosts on a network by
Network Sweeping sending ping requests to multiple IP
addresses.
Retrieving information from services
running on open ports, such as web
Banner Grabbing
servers, to identify software versions
and configurations.
AF OS Fingerprinting
Identifying the operating system of a
target machine using tools like Nmap.
Techniques Sending emails or using tools to gather
Email Harvesting information about an organization's
email server and structure.
Querying SNMP to extract information
SNMP (Simple Network Management
about network devices, software
Protocol) Enumeration
versions, and configurations.
Attempting to obtain a copy of the DNS
DNS Zone Transfer zone file from a DNS server, which can
reveal internal network structure.
Active Footprinting Technique Description
Engaging directly with employees
Social Engineering (Direct or systems to gather information,
Interaction) such as calling help desks to extract
details.
Mapping the path data takes to
reach a target, revealing
Traceroute Analysis
intermediate devices and network
structure.
AF Downloading a copy of a website
Techniques Website Mirroring
for offline analysis, which may
reveal hidden pages, scripts, or
metadata.
Scanning for wireless networks to
Wireless Network Scanning identify their security settings,
SSIDs, and access points.
Using tools like Maltego to map
relationships and information about
Maltego Analysis
a target organization through active
queries and interactions.
Google Hacking
Google Dork Description
site:example.com Restricts the search to pages within the specified domain.
Searches for specific file types, which may contain sensitive
filetype:xls OR filetype:doc OR filetype:pdf
information.
Finds open directories on the target site that might contain
intitle:"index of" site:example.com
exposed files.
Searches for admin login pages or control panels within the
inurl:admin
domain.
Finds login pages that could be targeted for brute force or
inurl:login
other attacks.
inurl:wp-admin Specifically targets WordPress admin login pages.
Looks for documents or pages containing the word
site:example.com intext:"confidential"
"confidential."
Searches for pages where passwords might be stored or
site:example.com intext:"password"
discussed.
site:example.com ext:bak OR ext:old OR Finds backup files that may have been left accessible on the
ext:backup server.
Looks for pages displaying database error messages, which
site:example.com "database error"
might reveal SQL queries or other database information.
• Reference website
• https://www.exploit-db.com/
How to protect from Google Hacking
• To protect your organization from being vulnerable to Google
Dorking, you can implement several measures to reduce the exposure
of sensitive information and prevent unauthorized access.
• Secure Sensitive Files and Directories
• Configure your robots.txt file to instruct search engines not to index certain
parts of your website.
• Password Protection: Protect sensitive directories and files with strong
passwords and ensure they are not accessible without authentication.
• NoIndex Meta Tags: Use the noindex meta tag on pages that should not be
indexed by search engines.
• Example: <meta name="robots" content="noindex">
How to protect from Google Hacking
• Use Proper File Permissions
• Restrict Access: Ensure that sensitive files (like .xls, .doc, .pdf, .bak) are not
publicly accessible. Set correct file permissions on the server to limit access to
authorized users only.
• Avoid Exposing Backup Files: Remove or secure backup files, such as those
with extensions .bak, .old, .backup, from being publicly accessible.
• Implement Web Application Firewalls (WAF)
• Filter Malicious Queries: A WAF can be configured to detect and block
suspicious queries, including those typical of Google Dorking attempts.
• Rate Limiting: Implement rate limiting to reduce the risk of automated tools
being used to scrape your site.
Foot printing with Specialized IoT search
engine (https://www.shodan.io/)
• Shodan is a specialized search engine that scans and indexes devices
connected to the internet.
• Unlike traditional search engines like Google, which index websites
and content, Shodan focuses on discovering the various devices that
are exposed to the internet, such as servers, routers, webcams,
industrial control systems, and IoT devices.
• Shodan uses metadata which are called banners.
• Example: 220 kcg.cz FTP server (Version 6.00LS) ready.
• This tells us a potential name of the server (kcg.cz), the type of FTP server
(Solaris ftpd) and its version (6.00LS).
Key Features
• Device Discovery
• Security Assessment
• Search Filters
• Real-Time Monitoring
• API Integration
Use Cases
• Security Auditing: Organizations use Shodan to audit their external-
facing infrastructure, ensuring that only intended devices are
accessible and identifying any potential security gaps.
• Research: Researchers use Shodan to study the global distribution of
specific devices, understand the exposure of industrial control
systems, or analyze the security posture of IoT devices.
• Threat Intelligence: Shodan provides valuable data for threat
intelligence, helping security teams understand potential attack
vectors by analyzing exposed devices and services.
Areas
• Network Security: keep an eye on all devices at your company that
are facing the Internet
• Market Research: find out which products people are using in the
real-world
• Cyber Risk: include the online exposure of your vendors as a risk
metric
• Internet of Things: track the growing usage of smart devices
• Tracking Ransomware: measure how many devices have been
impacted by ransomware
Example of Banner
The information for each service is
stored in an object called the banner.
• { •data: the main response from
• "data": "Moxa Nport Device the service itself
• Status: Authentication disabled •ip_str: IP address of the device
• Name: NP5232I_4728 •port: port number of the
• MAC: 00:90:e8:47:10:2d", service
• "ip_str": "46.252.132.235", •org: the organization that owns
• "port": 4800, this IP space
• "org": "SingTel Mobile", •location.country_code: the
• "location": { country where the device is
• "country_code": "SG" located
• }
• }
Other techniques of Footprinting
• Footprinting through Web Services
• Top Level Domains and Sub-domains
• Netcrapft
• Sublist3r
• Geographic location of target
• Google Earth
• Gathering information LinkedIn
• theHarvester
• Footprinting through Job Sites

You might also like