Unit 2
Unit 2
There are many tools that can be used to copy websites locally.
Httrack.
Website Ripper Copier
HTTrack
It downloads the contents of entire Web sites from the Internet
to a local directory for offline viewing.
It allows you to download a World Wide Web site from the
Internet to a local directory, building recursively all directories,
getting HTML, images, and other files from the server to your
computer.
Website Ripper Copier tool
One more great tool is Website Ripper Copier, which has a few
additional functions than httrack.
information Gathering with Whois
Command :
Whois holds a huge database that contains information
regarding almost every website that is on the web.
most common information are “who owns the website” and “the
e-mail of the owner,” which can be used to perform social
engineering attacks
whois
apt-get install whois
Eg:
$ whois www.cvr.ac.in
$whois www.techlotips.com
Intercepting a Response
Burp Suite
Step 3—Next, open Firefox. Note: You can use any browser, but I would
recommend Firefox. Go to Tools → Options → Advanced → Network →
Settings.
Step 4—Click on the “Manual Proxy configuration” and insert the information
given in following screenshot and click “Ok
Step 5—Next, open up Burp Suite again, navigate to the “proxy”
tab and click on the “intercept” tab and click on “intercept is off”
to turn it on.
Step 6—Next, from your Firefox browser, send an http request
by refreshing the page. Make sure the intercept is turned on.
Step 7—Next, we would need to capture the http response in
order to view the banner information. Intercepting the response
is turned off by default, so we need to turn it on. For that
purpose, select the http request and then right click on it, and
under “do intercept”, click on “response to this request.
Step 8—Next, click on the “Forward” button to forward the http
request to the server. In a few seconds, we will receive an http
response, revealing the http server and its version.
Eg:
Tracing the Location
Host discovery
Machine fingerprinting to determine OS (using Nmap)
Use of DNS and ICMP to detect network hosts
Network monitors
Cheops-ng Cheops-ng is another remarkable tool for tracing and
fingerprinting a network
WhatWeb
WhatWeb is an all-an-one package for performing active
footprinting on a website.
It has more than 900 plug-ins capable of identifying server version,
e-mail addresses, and SQL errors.
This tool can identify and recognize all the web technologies
available on the target website.
This tool can identify technologies used by websites such as
blogging, content management system, all JavaScript libraries.
The usage is pretty simple:
you need to type ./whatweb followed by the website name.
Command: ./whatweb flipcart.com
Example
Netcraft
Tools :
Nslookup(nameserver look up)
DIG(Domain Information Groper)
Nslookup
Nslookup is available in both Windows and Linux OS.
if we want the DNS servers to return all the mail server records of an
organization.
We would do the following:
The query has returned all the name servers associated with ifixit.com
DIG
You would notice that the zone transfer would be successful and
it would return the full list of subdomains that normally cannot
be discovered with other techniques.
Example dig axfr @ns12.zoneedit.com zonetransfer.me
Automating Zone Transfer
The first step would be to ask the DNS cache for any given
resource record,
If the response is cached, that is, if it finds the record you asked
for, the response would be valid and would return an answer,
indicating that someone on that system visited that particular
website.
If the response is not cached, it will return a reply about another
server that can answer the query better or it will send the
root.hints DNS file contents, which contain the name and
addresses of all root DNS servers
Command:
dig @ns1.jpd.com javapoint.com A +norecurse
Recursive method
1. The first step would be to ask the DNS cache for any given resource
record
2. Next, we would set the query to be recursive instead of
nonrecursive.
3. Next, we would examine the TTL field, which will tell us how long
the DNS record stays inside the cache. So we would examine the TTL
in the answer section and compare it with the TTL that was initially
set. If the TTL field in the answer section is less than the initially set
TTL field, the record is most likely cached and someone on that
domain name server visited that website.
4. Now, if the record is not present in the cache, it will be present after
the first query is made.
Command:
dig @ns2694.hostgator.com www.techlotips.com A +recurse
SNMP
OneSixtyOne tool
Onesixtyone is an all-in-one tool for scanning and brute-forcing
SNMP community string.
$apt –get install onesixtyone
Onesixtyone <ipaddress> -c/dictionary.txt
OneSixtyOne…
The usage is very simple. We need to do is to enter the IP
address followed by the path to the dictionary, and it will
attempt to connect to the SNMP service by using the community
strings you have defined in the dictionary
Snmpenum