Ethical Hacking Unit 2
Ethical Hacking Unit 2
FOOTPRINTING:
Footprinting is the first step of an attack on information systems in which an
attacker collects information about a target network for identifying various ways
to intrude into the system.
Using this, we can find a number of opportunities to penetrate and assess the
target organization’s network.
Types of Footprinting:
1. Passive Footprinting
2. Active Footprinting.
1. Passive Footprinting:
This involves gathering information about the target with direct interaction. In
this type of footprinting, the target may recognize the ongoing information
gathering process, as we only interact with the target network.
ping command:
Now let’s examine one of the most popular utilities related to network
connectivity.
Probably the first command that every computer user runs on the command line
when having connectivity problems is the “ping” command.
This will quickly show you if can send and receive packets (icmp packets to be
exact) from your computer and hence shows whether you have network
connectivity or not.
Note also that “ping” is useful for testing connectivity for both the local computer
from where you execute the command and also for a remote computer or server
which you try to reach
nslookup command:
“nslookup” stands for “Name System Lookup” and is very useful in obtaining
Domain Name System (DNS) related information about a domain or about an IP
address (reverse DNS lookup).
nslookup [IP Address]: This will perform a reverse-DNS lookup and will try to
match the given IP address in the command with its corresponding domain
name.
scanning attacks:
Scanning in ethical hacking is a network exploration technique used to identify
the systems connected to an organization’s network.
Scanning is more than just port scanning, but it is a very important part of this
process.
Scanning allows you to identify open ports on the target system and can be
used for port mapping, performing an interactive session with the operating
system via those ports, or even redirecting traffic from these open ports.
There are many tasks that can be performed with a scanning tool.
Active Scanning:
Active scanning is a type of network scanning technique that is used to gather
information about a target system or network.
Unlike passive scanning, which only gathers information that is readily
available, active scanning actively interacts with the target system to gather
information.
It involves sending requests or packets to a target system and analyzing the
responses to gather information about the target.
This type of scanning is more aggressive and intrusive than passive scanning
and is often used to identify vulnerabilities and weaknesses in a target system
or network.
Passive Scanning:
Passive scanning is a type of network scanning technique that is used to gather
information about a target system or network without actively interacting with
the target.
Unlike active scanning, which sends requests or packets to the target and
analyzes the responses, passive scanning only gathers information that is
readily available, such as information transmitted over the network or stored in
system logs.
It is used to gather information about a target system or network for a variety of
purposes, including network mapping, vulnerability assessment, and
compliance testing.
By analyzing network traffic and system logs, passive scanning can provide
valuable information about a target’s infrastructure, servers, and devices, as
well as the types of services and applications that are running.
2. TCP syn port scan: This is a similar type of scan, but the packets are TCP
SYN packets and not TCP ACK.
This type of scan sends packets to ports that are open and waiting for a
reply.
DNS ENUMARATION:
Domain Name System(DNS) is nothing but a program that converts or
translates a website name into an IP address and vice versa.
Importance:
It helps in discovering the various services and hosts that are running on the
domain.
It makes the target surface larger as we enumerate further.
Furthermore, it exposes the critical information about the target.
Impact:
The attacker can read about the system data and also can modify it.
It can also lead to various other potential DNS attacks.
It gives the Threat actor very critical details about the system that the attack
can leverage to other attacks.
There are various tools to do DNS Enumeration, you are free to explore them
by doing a simple web search about DNS Enumeration tools, but here we are
going to use Nmap as an example:-
Nmap:
It is a tool used to discover host and services that are currently running of a
computer network. Nmap provides an extensive Script by the name dns-nsec-
enum.
Conclusion:
DNS enumeration is very powerful for target mapping.
You can simply do DNS Enumeration by your Linux or Windows terminal.
DNS Enumeration exposes many attack surfaces.
It is not possible to hide yourself from DNS Enumeration 100%.