Verzeo Minor Project
Verzeo Minor Project
Types of Footprinting:
Footprinting through Search Engine
Footprinting through social engineering
Footprinting through Social Networking sites
Website Footprinting
Competitive Intelligence
WHOIS Footprinting
Footprinting using advanced Google hacking techniques
Email Footprinting
DNS Footprinting
Network Footprinting
Browsing the target Website may Providing
Whos is Details
Software used and version
OS Details
Sub Domains
File Name and File Path
Scripting Platform & CMS Details
Contact Details
Whois footprinting
WHOIS (pronounced as the phrase who is) is a query and response protocol and whois
footprinting is a method for glance information about ownership of a domain name as
following:
Domain name details
Contact details contain phone no. and email address of the owner
Registration date for the domain name
Expire date for the domain name
Domain name servers
Whois Lookup
It is broadly used in support of querying databases that store the registered users or assignees
of an Internet resource, such as a domain name, an IP address block, or an autonomous
system, but is also used for a wider range of other information. The protocol stores and delivers
database content in a human-readable format.
Browse given URL http://whois.domaintools.com/in browser and type any domain name.
For example: let’s search pentestlab.in
Now you can see it has created a whois record for pentestlab.in where it contains details like
email address, IP, registrant Org. From the given record, anyone can guess that this domain has
some connection to raj chandel. The attacker needs to perform footprinting on raj chandel
taking help from the previous article.
There is so many other tools use for whois footprinting for example:
Caller IP
Whois Analyzer pro
Whois lookup multiple addresses
DNS Footprinting
The attacker performs DNS footprinting in order to enumerate DNS record details and type of
servers. There is 10 type of DNS record which provide important information related to the
target location.
1. A/AAAA
2. SVR
3. NS
4. TXT
5. MX
6. CNAME
7. SOA
8. RP
9. PTR
10. HINFO
Domain Dossier: it is an online tool use for complete DNS footprinting as well as whois
footprinting.
There are so many online tool use for DNS footprinting, using domain dossier we will check for
DNS records of penetstlab.in, select the check box for DNS records and traceroute and then
click on go.
You can observe that the data which we received from whois lookup and from domain dossier
is the same to some extent. It has given same email ID as above i.e. [email protected]
moreover details of DNS records TXT, SOA, NS, MX, A and PTR.
Website Footprinting
It is a technique used for extracting the details related to the website as following
11. Archived description of the website
12. Content management system and framework
13. Script and platform of the website and web server
14. Web crawling
15. Extract metadata and contact details from the website
16. Website and web page monitoring and analyzer
Archive.org: It is an online tool use for visiting the archived version of any website.
Archive.org has search option as way back machine which is like a time machine for any
website. It contains entire information from past till present scenario of any website either their
layout or content everything related to the website is present inside. In simple words, it
contains the history of any website.
For example, I had a search for the hackingarticles.in the archived record of 2012.
Built With: It is an online tool used for detecting techniques and framework involved inside
running website.
BuiltWith.com technology tracking includes widgets, analytics, frameworks, content
management systems, advertisers, content delivery networks, web standards, and web servers
to name some of the technology categories.
Taking the example of hackingarticles.in again we found the following things:
Content Management system: WordPress
Framework: PHP
Whatweb
Whatweb can identify all sorts of information about a live website, like Platform, CMS platform,
Type of Script, Google Analytics, Web server Platform, and IP address Country. A pentester can
use this tool as both a recon tool & vulnerability scanner.
Open the terminal in Kali Linux and type following command
whatweb www.pentestlab.in
As result, we receive the same information as above
Web crawling
HTTrack is a free and open source Web crawler and offline browser, developed by Xavier Roche
It allows you to download a World Wide Web site from the Internet to a local directory,
building recursively all directories, getting HTML, images, and other files from the server to your
computer. HTTrack arranges the original site’s relative link-structure.
Give target URL for copy the web site as www.pentestlab.in which starts downloading the
website.
http://www.hackingarticles.in/5-ways-crawl-website/
Competitive Intelligence
Website-Watcher is a powerful yet simple website-monitoring tool, perfectly suited to the
beginner and advanced user alike. You can download it from here.
Using the new tab and enter the target URL which starts monitoring the target website.
For example, I enter the URL hackingarticles.in for monitoring this website.
Similarly, there are some other tools uses for monitoring:
On web change
Follow that page
Informinder
Problem Statement: 2. Perform SQL injection on by on
http://testphp.vulnweb.com Write a report along with screenshots and mention
preventive steps to avoid SQL injections.
Reporting Screenshots
After attack
During attack:-
Completion of attack:-
1. Web developer ---> alpha numeric only keys should be allowed in username
Step2: Write PHP code for to capture the username and password and redirection and save the
file
with facebook.php
Loaction is used to redirect the page after clicking on signin
Facebook.txt file is used to save the login username and password
Step3: select the html file Rightclick openwith notepad (or) sublimetext
Step4: search for action= in html code and replace the original link with
facebook.php on both
places as shown images
.
Step5: Now we need create an empty txt file with name of Facebook.txt
Step7: Now we need to upload those 3 files in to domain hosting, will use free 3 rd party services
to host files in to website (https://www.freewebhostingarea.com/ )
step8: create a free domain here and signup with email and password
Step9: Login in to Web FTP by clicking on links and login with credentails to upload phishing
pages
Step10: After login click on Upload button and upload all 3 files
(facebook.html/facebook.php/facebook.txt)
Step11: Change the permissions for 3 files to (read,write,execute) by clicking on chmod button.
Problem Statement:4. Use SET toolkit to perform automation task on
phishing and capture the details and write a report on this attack and
protection from social engineering attacks.
As a penetration tester there will be times that the client requirements will be to
perform social engineering attacks against their own employees in order to test if
they follow the policies and the security controls of the company. After all if an
attacker fails to gain access to a system, then it might try alternative ways like
social engineering attacks.
In this article we will see how we can use the Credential Harvester Attack
Vector of Social Engineering Toolkit in order to obtain valid passwords.
The first thing that we need to do is to attach our laptop into the network of the
company that we need to do the Social Engineering Attack.When our system
obtains a valid IP address from their DHCP Server we are ready to launch the attack.
To start the Toolkit, just type “toolkit” in your terminal window.
Our choice we will be the Website Attack Vectors because as the scenario indicates
we need to test how vulnerable are the employees of our client against phishing
attacks.
We will use the Credential Harvester Attack Method because we want to obtain
the credentials of the users.
As we can see in the next image SET is giving us 3 options (Web Templates, Site
Cloner and Custom Import).
For this example, we will go with “Web Templates” option because it has some
ready-made Web Templates which we can easily use.
Now we need to enter our IP Address where you want to receive all POST back
requests.
And in last stage, you need to choose the Web Template, and in this case, we
selected Facebook because it's one of the most popular social networking platforms.
Now it is time to send our internal IP to the users in the form of a website (such as
http://192.168.179.160).This can implemented via spoofed emails that will pretend
that are coming from Facebook and they will ask the users to login for some reason.
If a user reads the email and make a click to our link (which is our IP address) he will
see the Facebook login page.
Let's see what will happen if the victim enters his credentials…
As we can see from the moment that the victim will submit his credentials into the
fake website SET will send us his Email address and his password. This means that
our attack method had success.
If many users enter their credentials to our fake website, then it is time to inform
our client to re-evaluate his security policy and to provide additional measures
against these types of attacks.
Conclusion –
In the scenario that the user would like to login with his account then our
attack will have 100% success but even if the user will not login with his
email and password the attack is still successful because the user has opened
a website that came from an untrusted source.
This means that if the website had some sort of malware, then it would infect
the user computer because the user simply ignores the security policy of the
company and opened an untrusted link. So, the company must provide the
necessary training to their employees in order to have a clear understanding
about the risks.
Educating the employees is the key fact because even if your organization is
using all the latest anti phishing software the employees could be the
weakest link by opening a link that comes from an unknown origin. They
must be aware about what is phishing,not to open any links and to put their
details and to always check the address bar and things that would not look
normal in order to avoid being scammed.
Always remember that a system administrator can patch a computer but
there is no patch to human weakness.