Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
50 views
Module - 2 (Footprinting)
ceh
Uploaded by
pamukumar
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save Module - 2 (Footprinting) For Later
Download
Save
Save Module - 2 (Footprinting) For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
0 ratings
0% found this document useful (0 votes)
50 views
Module - 2 (Footprinting)
ceh
Uploaded by
pamukumar
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save Module - 2 (Footprinting) For Later
Carousel Previous
Carousel Next
Save
Save Module - 2 (Footprinting) For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 94
Search
Fullscreen
Module 02 esd] . Presented by Professionals.Security News NEWS. Aaa MC bec Ear | Facebook a ‘treasure trove’ of BP 202 Personally Identifiable Information Facebook contains a “treasure trove" of personally identifiable information that hackers manage to get their hands on. Idetalled a concent | call “riend-mapping”, where an attacker can get further knowledge of ‘user's circle of friends; having accessed their account and posing es a trusted friend, they can ‘cause mayhem. This ean include requesting the transfer of funds and extortion. ‘Asked why Facebook sso important to hackers, Imperve senior cecurity strategict Noa Bor-Voset sald: “People also add work friends on Facebook so a team leader can be ident:fied and this can lead ‘to corporate data baing accessed, project work being discussed openly, while gec-location data can be tailed for military intelligence. eep://anowsemogazineu.com pe ee eeFootprinting Terminology What Is Footprinting? Objectives of Footprinting Footprinting Threats Footprinting through Search Engines =, Website Footprinting Email Footprinting Competit e Intelligence Footprinting Using Google | re WHOIS Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting through Social Networking Sites Footprinting Tools Footprinting Countermeasures Footprinting Pen Testing tenModule Flow Ca] Footprinting Concepts Footprinting Threats H Footprinting H] Methodology Footprinting Footprinting Counter- measures Footprinting Tools Penetration Testing Ce en eee toedFootprinting et duel Open Source or Passive Information Gathering Collect information about a target from the publicly accessible sources Anonymous Footprinting Gather information from sources where the author of the information cannot be identified or traced Organizational or Private Footprinting Collect Information from an organization's web-based calendar and email services Active Information Gathering Gather information through social engineering on-site visits, interviews, and questionnaires Pseudonymous Footprinting Collect information that might be published under a different name in an attempt to preserve privacy Internet Footprinting Collect information about e target from the internet ns a 5h aWhat Is Footprinting? Footprinting is the process of g as much information as possible about a target network, for identifying various ways to intrude into an = i [ e Collect baste Gen about res I =) @ Determine the operating system used, platforms running, web the target and its network Eo e server versions, ete eeeWhy Footprinting? 3 Know Reduce Build Information Draw Security Posture Attack Area Database Network Map eee ed ce ea Tea eee coy Cee ee ied Poe eke ati Bea ees een eta Sees Sea address, networks, Sec Dee Cre a cay Pens Cee re ee ec Fe ao Pee Cs Cea ata See Be eu ers Cec bce eae eau ie!Cee od eed eo eee ree reso Seo’ el Era eee Teer ed eee= & Ansloe/ gil User and Group Names Telephone Numbers a reward we Senices Neborking 7 | P| rota rate Webs } ween | — ere a = Ads pasa — eee oe Organization's Website Ps ee we) ye LG =B ewe ide) eae Ba Press Releases ofthe Organization Phone Numbers Erwioyee Details syRer manners ing og Remote system Type seater “Architecture la Lee Routing ss Web Server Linke Locstion Dette ae Tables system NomeModule Flow C/EH Footprinting Concepts Footprinting Threats Footprinting Methodology Footprinting Footprinting Counter- measures Footprinting Tools Penetration Testing ee ete eee ee eee aeFootprinting Threats Wi Attackers gather valuable system and network information such as account details, operating system and installed applications, network components, server names, database schema details, etc. from footprinting techniques Types of Threats aa Privacy | Corporate | Business panes Leakage Loss l Espionage IK Loss Information eeeModule Flow (qi | Footprinting Concepts Footprinting Threats Footprinting Methodology Footprinting Footprinting Penetration Counter- Testing measures Footprinting Tools ee ete Le ee eee ceeye Meee urd gre at leer M et ees Peer ee Footprinting Methodology ala Pers nn DNs i] Dees ard ee cciet eee eee) nee cit tice eet call Cee eee eeeFootprinting through Attackers use search engines to extract information about a target such as technology platforms, employee details, login pages, intranet portals, etc. which helps in performing social engineering and other types of advanced system attacks Search engine cache may provide sensitive information that has been removed from the World Wide Web (WWW) Gee ren oeFinding Company’s © Search for the target company’s external URL in a search engine such as Google or Bing ©@ Internal URLs provide an insight into different departments and business units in an organization ©@ You may find an internal company’s URL by trial and error method Tools to Search Internal URLs hetp://news .neteraft.com http://www webmaster-a.com/ Link-extractor-intemnal .php err Al Internal URL’s of microsoft.com oe ere cee = steerer or = - oer ——— wednte-microsatticom 9 cestmer-microcarticon a windows microsoft.comPublic and Restricted Websites Identify a company’s private and public websites ee er up: {fewnv.microsoft.com ‘new once micosoR com ep fonswers miesorecom Public Website J |Collect LocationInformation C|EH eee annotate tematic | Googe | Ce ee eeesrmation about an individual can be | thepeopie search retina te oR found at various people search information about a person: websites © Residential addresses and email addresses © Contect numbers and date of bith ¢— , @. Photes and social nefrey Ererptles © Blog uals |e © Satelite pictures of private residencies a =e | ae 5 a me au =n : q " : A - os =a #en> A i 4 an msn —a ——S : J | “hte:/foiptcom Tat ew spokeo com AltR tezerved, Reproduction i Strictly Prohibited.People Search ing) Zaba Search ee tt hcbescarcscom Fa a6, Zoominfo ) PeekYou Fh ,rensrereonteocon =e) rae Wink People Search stp /pvnecom ‘AnyWho @ ) — PeopleSmart bipyAmascpsho.com | ftp /A.peplesmartcom ft People Lookup ‘httpsi//wwrm.peoplelookup.com 123 People Search tto.//ew.1230c00ke.com Intelius tp /foe nteliuscom WhitePages ttp://ewneabitepages.com enedPeople Search on ‘nttn:/fuwnw. Facebook.com ‘htto://orwdinkedia.com hites/feviticncom ‘httos //plus.google.com copynghe © PeGather Information from (la ee eee toeFootprinting through laa EY ren pathercompany’s infrestructure details from b ti ‘emmesps _‘job postings Look for these: Job requirements Employee’: profile 2 Hardware information Software information Examples of Job Websites hetp://uwu.monstercom hip: /orwvesuroarbiider oer oa http://wwwcdice.com http://www. simplyhired.com 64) hetp://www.indeed.com http://www.usajobs.cov eee reTarget Using Alerts Alerts are the content monitoring services Examples of Alert Services that provide up-to-date information based on your preference usually via email or © Google Alerts - tpn google com/alets SMS in an automated manner © Yahoo! Alerts -http://alerts yahoo.com ) © Giga Alert - http://www gigaalert.com a Google aiers Seach query: Securty News CeeFootprinting IViethodology at [amencnr aie nner ie Pee Nees tt Mea ahr DNS Footprinting eras Dearie’ eee rea ett eee acu d Coe ee ated om ee ee eeda Website Footprinting a] Information obtained from target’s website enables an attacker to build a detailed map of website’s structure and architecture Browsing the target website may provide: © Software used its version. < Operating system used © Sub-directories and parameters Filename, path, database field name, or query © Scripting platform Contact details and CMs details Use Zaproxy, Burp Suite, Firebug, etc, to view headers that provide: © Connection status and content-type Accept-Ranges = Last Modified information X-Powered-By information = Web server in use and its version itp://portswigg TT Le eeFootprinting (Gont’d) Examining HTML source provides: Examining cookies may = © Comments in the source code © Software in use and its behavior c ts in th cs eH» e Contact details of web developer or admin | pla Rpaaniarichite — ao saree é | eeMirroring Entire Website | C/EH Mirroring an entire website onto the local system enables an attacker to dissect and identify vulnerabilities; it also assists in finding directory structure and other valuable information without multiple requests to web server Mirrored Website Sr eeeWebsite Mirroring Tools CIE Donte //urwm:surfoffline.com) \WebRipper (nttp:/Avww.calluna-software.com) IL All Rights Reserved. Reproduction is Strictly Prohibited.Tools (Cont'd) Website Ripper Copier PageNest pwn tensons.com fee /rowsepogenest.com uid! Teleport Pro Backstreet Browser ae) leper Bowe toe =. Portable Offline Browser "Offline Explorer Enterprise K D) rrinincroaticon ERD icevtrmmtanednccon Proxy Offline Browser GNU Wget BN itis estniprony aiiintr nesses tit http//wuwgnuorg Hooeey Webprint ttp://unnvhoceeywebprint.com iMiser bties//internetrescarchtocleom peeExtract Website Information from Website Information eet All Fights Reserved, Reproduction is Strictly Prohibited.Monitoring Web Updates Website Watcher eestewaere 2012/23 eden Alesis ‘ttp:/faignes.comFootprinting Viethodology ee eel ue cae Engines Mee oteT) Email Footprinting Competitive Intelligence Cee Tac Cala DOr uu DN Deen urd Ree nee at auc eet oie ety cities Se Ce eee ee een‘@ Attacker tracks email to gather information about the physical location of an individual to perform social engineering that in turn may help in mapping target organization’s network ‘@ Email tracking is a method to monitor and spy on the delivered emails to the intended recipient ‘When the email was fe received and read GPS location and map of the recipient ‘Time spent on rea the emails Set messages to expire after a specified time Track PDF and other types of attachments Whether or not the recipient visited any links sent to them CaerCollecting Information from clEH Email Header eat ada The address from which the message was sent p sionates Sendarsmalisenan) . (ate end time raceived bythe orzinetr's eal servers Ruthanticationsyrtem pects tron:to ‘unique umber assigned by rmzocele-cormt Menelythe message ee eee eedEmail Lookup - Free Emall Tracker mttaer Aransis eWallfrackerPr (itpi//nunncemaitrockerro.com) PoliteMail (http://www poltemail.com)Tools (Cont'd) Pointofmail ‘xp /fo potatofrnat. com Read Notify -:/Aumau react com Super Email Marketing Software | it://snw-bll email marketing sofowerenet | DidTheyReadit | | http://wwwadidtheyreadit.com WhoReadMe nto://vhoreodme.com Trace Email ‘nex /Auhaismytoateresscom MSGTAG GetNotify ttox/rowwrmegtog.com ttp:/;wgetnctifycom Zendio G-Lock Analytics btto://vewv.zendiowcon to /alockanaitiescom tosFootprinting iethodology fais Oars ca DNS unig Merete rd Email Footprinting Deas Lr Pema genet ces eer) eee cated Peers ue {Saas , Ge eee acdCompetitive Intelligence Gathering Q @ Competitive intelligence is the process of identifying, gathering, analyzing, verifying, and using information about your competitors from resources such as the Internet & Competitive intelligence is non-interfering and subtle in nature Sources of Competitive Intelligence 1 Company websites and employment ads © Social engineering employees 2) Search engines, intemet, and online databases, 7 Product catalogues and retail outlets 3) Press roteases and annual reports 8) Analyst and regulatory reports (Ap eto canteen, Peer (2p) eetone ant venoms (8) Piet ond vemat | (49) Hee stint eae: 1° by F6-Comcil allmughts Racerved, Reproduction Strictly Prohibited.Competitive Intelligence - 2 Visit These Sites When did it begin? eee eee i 01. EDGAR Database http://www.sec.gov/edgarshtml Sea 02. Hoovers i Cc ° i Whereisit 1) \__ How did it http://www.hoovers.com located? “7 ( Company FP" develop? a i ‘cS oO H 03. LexisNexis —— em http://worwlexisnexis.com 04. Business Wire i DO Who leads it? http://wwrw.businesswire.com Crs re SeeCompetitive Intelligence - v €Rq/<1<1¢ 2 Market Watch (htep://www.marketwatch.com) The Wall Street Transcript (http://www.twst.com) Lipper Marketplace (http://www lippermarketplace.com) Euromonitor (hitp://Avww.euromonitor.com) Fagan Finder (http://Awww.faganfinder.com) SEC Info (htzp://Awww.secinfo.com) The Search Monitor (http://www.thesearchmonitor.com) parry Competitive Intelligence Sites Market Wfatch twst.com Cena Seexeam Fagan \FinderCompetitive Intelligence - What Expert aa" Opinions Say About the Company 2 ben Cea ous Da cau Cee a ed http://wwew.copernic.com ABI/INFORM Global Cet eee esd ce Dee) ee ee) Pte De ee ee BT cs De er RL Ania erin eda eneFootprinting Viethodology C/EH Pee ue ey SUOG ema raiy Wehr Dts const ania Nea as ; ; Becca er (ee re ad leona eeu eee eee eee ee ee eeeFootprint Using Google Hacking CEH Techniques oo pes ae tec acd Drees sa as Ceca Ey Boon Reo Bees 4 Qe cae Sa Cee Pm RM cay Roc eee ee ee eee eeWhat a Hacker can do with Google Hacking? coo ree Bele Cae-clueH Pea een eee Datla Bete Go i ag Seay ieee Tata Poet Rn directories Cece eee Ce eeeae Google supports several advanced operators that help in modifying the search Ser res [eaiaticoedeeel ¢& Restricts the results to those websites in the given domai [uisuusnestiess| Pens fatima tal Pee eC eee ee acy eeUsing Google Advance Operator [intitle:intranet inurl:intranet +intext:”human resources”): The above combination of the Google advanced search operators allows you to access a target company’s private network and collect sensitive information such as employee listings, key contact details, etc. that can be incredibly useful for any social ‘engineering endeavor Copyright © by’Google Hacking Tool: Google Hacking Database (GHDB) Pes kha pe Ce ae eee cea eee aaMetaGoofil ‘upsfwvnaedge-security.com Goolink Scanner ‘ttp://ewrw-ghacks.net SiteDigger rtps/fuainu mcafee carn Google Hacks ‘nte://eodeacoalecora BILE Suite ttpx//uwnu.sencepost.com Cony ee Google Hack Honeypot ins/fobn sourceforge net GMapCatcher http://code.google.com SearchDiggity rps fous stochlicom Google HACK DB tte://ewseepeinticorn Gooscan tips ene darknetorg.uk ction is Strictly ProhibitedFootprinting IViethodology C/EH ed Vereen gras ea Ten ters eed ce curacy eter eee eel eS ee ela reer DIS tia Network Footprinting een sete erie ent ee a cet es seta a eee oeat WHOIS databases are maintained by and contain the WHOIS query returns: Information obtained Regional Internet from WHOIS database Registries (RIRs) Domain name details ncaiats aw atteckor ti Contact details of domain Create detailed map of aFRINich =—AREN arte’ organizational network Domain name servers eee eee a ene that aslsts t0 perform socal @apnic| () ee ee ee engineerin created . 8 Expiry recor Records last updated Gather other internal network details, etc. Cea ee eee aeGW WHOIS Lookup Ff EH hhttp://whois.domaintools.com hnttpi//centralopa.net/co ete enWHOIS Lookup Tool: (ai | Pe Sse ] v Bi@-%-O BsBe& ee net] Dea mms Se Naat Deut) psa 3 od Peete ani) rel tay As Si ed ee Ue Deere ned See ue Bateau ee Eee eee Sao eee eee arCountryWhois itps//uamu-toros corn Whols Analyzer Pro tte:/ Am asboisanalyze.com LanWhols ‘tes Manticks corn HotWhois ttp://rwnntiolsofucom 4 7 Batch IP Converter Whois 2010 Pro BE rypnunesotmesicn tp Popshiecom Beg CallerIP ActiveWhois Peet) Atto://amw.callerippvo.com i _ WhoisThisDomain bttp:/pnirsefnet Whols Lookup Multiple | Addresses heise eeeWHOIS Lookup SmartWhois ‘tto://smartwhoi.com Better Whois ten://ow.betterwhots.com Whois Source ttox//usmuhoisse Web Wiz ‘ook shel Tookup htm Network-Tools.com ‘tto://network-toolscom ttos//ueow eb co.uk/ domain Whois itp fools whcisnat DNSstuff eeo://ovnu dosstufcom Network Solutions Whois http fru networksolutions.com WebToolHub ttp://ewnw.vebtoelhub com/tn56133 Eithols-fookup asp» Ultra Tools ttpes//wwnmultratookecom/whoie/homeFootprinting Methodology ala emer fee M td Pee a cr eee attic ake ie Pras uu Ds rd Deen ry een et eer eee Peace ee een eee eeee 2 Attacker can gather DNS information to determine key hosts in the network and can perform social engineering attacks 2 @ DNS records provide important information about location and type of servers DNS Interrogation Tools a) = Description | Bind © http://www.dnsstuff.com | WOK Peis to dams’ ma cer © http://networktools.com SOR nat ivory or domain — eee | && CF Response penn ‘ | | nto tattoo eerie CU ye nd err Al ights reyExtracting DNS Information (Cont'd) This toa is very use to perform a DNS query on any hort. Each domin are (Example: dnsqueries.com) is structured in hosts (ex (queries. com) andthe DNS (Domain Name System) alow Y to translate the domain name or te hostname in sn IP Across corresponding te a to implomontate typos of NS record uh 36 8 record, MDX, AAAA, CNAME and SOA, Host ™m ticrosofu.com 2/3381 cal Glass Type ‘esp include: spf a. microsoft.com i mievroft.com 2) 2281 rer Linleesott pais tieoeoh.com 2) 2281 10 mail moseaging microsof.com 3 imiereottcom ©) 281 microsoft.com ©) 2381 A Seana microsoft.com 3) 351 65.5558.201 ricrosot.com o) 141521 microson.com ©} 141538 wt tmlcosof.comic) 141531 WL e2neno stamst.nt 3) ash. tictosof.com: nel sft FLUFCODRE-Avt nig BH IZ UsEvOLOUEIQDRGO/ VON aa @ Perform ONS query Houtame: Types ame Rum tools Detats ReaD SPs abd pt csmierotft com inca: op erg Limbresotecom paris 107.115.205 UTIT.ADT 115.214 Ipee205 248,108.04 par208 248,108.20, fetal. oot mrbat.nerveft.com 2012071603 200 6 2419200 3600 en ee eee embic Ge DNSWatch \ tated foumekotenet Gy) inmate myDNSTools DomainTools @) hao nydostool ine items domcintaolcom Professional Toolset "| DNs J Ii/Ao dso fy ued a DNS Records “Sky DNS Lookup Too! p/n telecom U Sit/mmanctccoahk | ‘| DNsData View / DNS Query Utility Bed evince nt $4) eae niaFootprinting Methodology (ata eect act keri ie aes WHOIS Footprinting DSi Network Footprinting Se se eC oscars Ce ee eed7 Locate the cE \@ Network range information obtained assists an attacker to create a map of the target’s network ‘@ Find the range of IP addresses using ARIN whois database search tool © You can find the range of IP addresses and the subnet mask used by the target ation from Regional Internet orga Registry (RIR) Network Whois Record Queried whois.arin.nct vith "a 207.46.292.162" detRance: 207.46.0.0 - 207.46.255.255 cia: 207.46.0.0/25, Origins: MICROSOFT-GLOSAL-WET NET-207-0-0-0-0 Dixect Asesqament NS2.MSET.NET NSé IMSer NEE NS1MSET.NET NSS (MSET NET 1997-03-91 2004-12-05 etp: //wnois.arin.net/rest/net/wer~ Microsoét Comp srr Ine Microsoft Way Redmond 1990-07-20 2003-11-10 Bttp: //whoss arin nst/rest/org/MSET ‘ABUSE231-2RIW ‘abuse abuseghotmail.comaDYelcovaeabbat-mail-) C\/EH Duce etDetermine the C/EH (Cont’d) ou) eset naw you find specific computers (rout servers, etc.) using a variety of filters Ey EXPOSE ONLINE DEVICES. ey eae) Copyright © by eee eae gaaTraceroute programs work on the concept of ICMP protocol and use the TTL field in the header of ICMP packets to discover the routers on the path to a target host IP Source Router Hop Router Hop Router Hop Destination Host ICMP Echo request m3, e4a Traceroute @ Attackers conduct traceroute to extract information about: network topology, trusted routers, and firewall locations © For example: after running several traceroutes, an attacker might obtain the following information: ‘traceroute 1.10,10.20, second to last hop is 1.10.10.1 traceroute 1.10.20.10, third to lest hop is 1.10.10.1 ‘traceroute 1.10,20.10, second to last hop is 1.10.10.50 traceroute 1.10.20.15, third to last hop is 1.10.10.1 © traceroute 1.10.20.15, second to last hop is 1.10.10.60 © By putting this information together, attackers can draw the network diagram. RERERREREEEEEEELEA 130303Traceroute C\EH eae eee faa a | {2Traceroute (Cont'd) Network Pinger i Magic NetTrace te: wma: netsorpinger om GXy Mor pnnetictopcom GEOSpider ‘tos fas orewraescom vTrace tte: ftrace ph Trout ites//vemwwmcafe.corn > ee F bttoy//umusoechiunet Roadkil’s Trace Route i & 2 | ere 3D Traceroute heep/ fourm ddtrde AnalogX HyperTrace ttp:/fonw.analog.corm Network Systems Traceroute etp://rewaunctprincetonedu Ping Plotter etp:/poos-pingpleter.com eeFootprinting Methodology C/EH Pee eu ee aes WHO'S Footprinting Des Ly DNS aurd gre aa Network Footprinting ae nearer Tee Cec er secur une niet ee sa eee eeFootprinting through Social Engineering © @ Social engineering is the art of convincing people to reveal confidential information © Social engineers depend on the fact that people are unawere of their [_ __ Valuable information and are careless about protecting it @ C Social engineers attempt to gather: Social engineers use these techniques: anes Shoulder surfing © Credit card details and cacial security Q © Eavesdropping ‘© Usernames and passwords = © Other personal information a ae ane Sint e © Impersonation on social networking Operating systems and software = e versions = gs ‘s elec eeeiheraes prec dae iit ix @ oS @Collect Information Using , and Eavesdropping Shoulder Surfing © Eavesdropping is unauthorized © Shoulder surfing is the procedure listening of conversations or where the attackers look over reading of messages the user's shoulder to gain © Itis interception of any form of critical information communication such as audio, © Attackers gather information such video, or written as passwords, personal identification number, account numbers, credit card information, etc. Dumpster Dumpster diving is looking for ‘treasure in someone else's trash Itinvolves collection of phone bills, contact information, financial information, operations ‘elated information, etc. from the target company’s trash bins, printer trash bins, user desk for sticky notes, etc. © eryFootprinting Methodology Cal Peete aie ake ced Ween anne era lee eae et WHOIS Footprinting Dra ui Da gras ca Re eree eeeelD st acs eer Se ae ee eedCollect Information through Social Engineering on Attackers gather sensitive Information through social engineering on social ~ networking websites such as Facebook, MySpace, Linkedin, Twitter, | ( Pintarest, Googles, etc. a Attackers create a fake profile on social networking, identity to lure the employees to give up ERplByEEE Way post personal information such as date of birth, educational and ‘employment backgrounds, spouses names, etc. and information about thelr company such a5 potential clients and business partners, trade secrets of businass, websites, company’s upcoming news, mergers, acquisitions, atc, Using the details of an employee of the target organization, an attacker can 8 compromise a secured facility eenInformation Available on Social Networking Sites @ Mg Mera gee Cds Mees Aue oo Ce dae ee Coe Tce} ier Ce ee eedCollecting Information | C/EH Chae @) |) using Facebook alll over the world 845 95" | 100 8,8) 250 26 1/5 ee 20 @ 6°S oy ! million monthly | billion million photos active users connections uploaded daily LofeverySof | minutes time all page views | spent per visit ey eensCollecting Twitter Information pay es 29.9 million 107.7 million = 9 Indonesia Beal 19.5 million 33.3 million %, eo "0. io Sc o entries with argest = ° = 465 million accounts hi 16% 32% Twitter users now post status updates UK, Q Wayne Rooney 23.8 million see Japan coo 350 od million tweets a day 55% 8 Twitter users access the platform via their mobile Ce ee eae ee eee eee)Collecting Linkedin Information PRM CR ko (2 dee ee Us new members million million companies join every second employees located revenue for 2011 have Linkedin around the world company pages er nL ee eee cae eeCollecting Pb WGermuiket ete 3rd | Most visited website oS 900 | average time users spend according to Alexa Sec | on YouTube every day — > ] 2 billion | Views per day 1/10 | One of every 10 Internet users opens YouTube 829,440 | videos uploaded every dayon Social Networking Sites © Users may use fake identities on social networking sites. Attackers use tools such as Get Someones IP or IP-GRABBER to track users’ real identity | Steps to get someone's IP address through chat on Facebook using Get Someones IP tool: © Goto ntep://waw.uyiptest.con/sta © Three fields exict: (neneeeeameent ana Copy the generated link of, Enter any URL you want Open the URL in this field this field and send it to the the target to redirect to and keep checking for ‘targat via chat to get IP target's IP address np ete ray ih gets eet eee || Atto://www.myiptest.com ReproductiModule Flow C\EH Footprinting Concepts Footprinting Threats Footprinting H] Methodology Footprinting Footprinting Counter- measures Footprinting Tools Penetration TestingFootprinting Tool: Vialtego Maltego is a program that can be used to determine the relationships and real world links between people, groups of people (social networks), companies, organizations, websites, Internet infrastructure, phrases, documents, and files Internet Dom: hetp://unoa paterva com 5 ‘EGOFootprinting Tool: Setting Wit n oe omain Name \nformatio ; Oo — : sp: domeinpunch.comFootprinting Tool: Extract targeted company contact data (email, phone, fax) from web for responsible b2b communication © Extract URL, meta tag (title, description, keyword) for website promotion, search directory creation, web research Phone Numbers eePrefix Whols ‘to-Zewhots.or9 tt: /puwunatscantook.com a Te ND RS ennnes Autonomous System Scanner (ASS) tx/oweaenoetw.or9 | | ea NetScanTools Pro tor/owwrsdiggercom fad DNS DIGGER Netmask tte //ranohenoelteusora Binging stp: pau big com Spiderzilla It /filerite.mosdevorg Sam Spade eep /pimeumajergeeks com Robtex ttp://wnvratexcom All RightsTools Corsi) SpiderFoot httes//avembinarypoo.cor Dig Web Interface http://www.digwebinterface.com Zaba Search tt://wrn:cabasearch.com ActiveWhois tie:/fauriohore.com GeoTrace Domain Research Tool CallerIP ntip:/fuuons domainresearchtocl.com tts//wnewscalerippro.cam yoName ‘http://yoname.com ttp://mvn.nabber.org Ping-Probe (_ Domaintostingview s/f pg probe com ep fen bof net Hi & = &Module Flow C/EH Footprinting Concepts Footprinting Threats Footprinting Methodology Footprinting Footprinting Counter- measures Footprinting Tools Penetration Testing Ce ee tee eeeFootprinting Countermeasures Configure routers to restrict the responses to footprinting requests Lock the ports with the eultable firewall configuration Evaluate and limit the amount of information available before publishing it on the website/ Internet and disable the unnecessary ser Prevent cearch engines from exching a web page and use anonymous registration 9 Configure web servers to avoid information leakage and dizable unwanted protocols Use an IDS that can be configured to refuse suspicious traffic and pick up footprinting patterns Perform footprinting techniques and remove any sei information found Enforce eecurity policies to regulate the information that employees can reveal to third partiesFootprinting Countermeasures (Cont'd) Disable directory listings and use split-DNS. | | YY Educate employees about various social engineering tricks and risks on Y_Pesecunapected inpu suchas [<> WZ rach © by EModule Flow C/EH Footprinting Methodology Footprinting Threats Footprinting Concepts _ = @ Footprinting Footprinting Counter- measures Footprinting Tools Penetration Testing Nene ee ee© Footprinting pen testis used to determine organization’ publicly available information on the Internet such as network architecture, operating systems, applications, and! users © The tester attempts to gather as much information as possible about the target organization from the Internet and other publicly accessible sources 4 " Footprinting pen go | tprinting p Prevent information leakage testing helps administrator to: Prevent DNS record retrieval from publically available servers Prevent social engineering attemptsFootprinting Pen Testing (Corse) © START ¥ oa author v Define the scope of the assessment Use search engines "> suchas Google, Yahoo! Search, Bing, ete v = Use tools such as Perform website > ligarse footprinting 7 SS © Get proper authorization and define the scope of the assessment © Footprint search engines such as Google, Yahoo! Search, Ask, Bing, Dogpile, etc. to gather target organization's information such as employee details, login pages, Intranet portals, ete. that helps in performing social engineering and other types of advanced system attacks © Perform website footprinting using tools such as HTTrack Web Site Cop! BlackWidow, Webripper, etc. to build a detailed map of website's structure and architecture. eeeFootprinting Pen Testing (Cont'd) Use tools such as Perform email “> elMailfrackerPro, footprinting PoliteMail, etc. v Use tools such as Gather competitive its Intelligence Businazs Wire, te v Perform Googie Use tools such as GHDB, hacl aol Perform WHOIS footprinting Use tools such as WHOIS Lookup, SmartWheis, etc. e > Copynght © by £6 MetaGoofil, SiteDizgcr, ete. Perform email footprinting using tools such as eMailTrackerPro, PoliteMail, Email Lookup ~ Free Email Tracker, ctc. to gather information about the physical location of an individual to perform social engineering that in turn may help in. mapping target organization's network Gather compatitive intelligence using tools such as Hoovers, LexisNexis, Business Wire, ete. Perform Google hacking using tools such as GHDB, MataGoofil, SiteDiggar, etc. Perform WHOIS footprinting using tools such as WHOIS Lookup, SmartWhols, etc to cracte detailed map of organizational network, to gather personal information that assists to perform social engineering, and to gather other internal network details, ete. I all eghts Reserved. Repreducto aePerform DNS footprinting Use tools such as DIG, NSLookup ete, ree beriomnatwort|..|..» apagertg wae ie oe Petomserl a)...» Dosminnsoast Sra ery ‘ Perform footprinting through cocial networking zitez v peste erin Create a falce identity on > social networking sites such as Facebook, Linkedin, etc. ——) Cea Po Perform DNS footprinting using tools such as DIG, NsLookup, DNS Records, atc. to determine key hosts in the network and perform social engineering attacks Perform network footprinting using tool such as Path Analyzer Pro, VisualRoute 2010, Network Pinger, etc. to create a | map of the targat’s network Implement social engineering techniques such as eavesdropping, shoulder surfing, and dumpster diving that may help to gather more critical information about the target organization Gather target organization employees information from their personal profiles fon social networking sites such as, Facebook, Linkedin, Twitter, Google+, Pinterest, etc. that assist to perform social engineering At the end of pen testing document all the findings eeeFootprinting Pen Testing Report Templates ere eie niet erie eons ao ee Pere 1B Technology patiorme: ear Dt? Peo eet Pt eeccs Peres cos Tree CUS act ees ees C ereenteeecr Paes 4154 ee ee et Pes coer aco Paco eos eect ters Pee een’ Pete eee Pees De ee nea en ae ees ee cs Pe ems es Cee eee eeeent eons a cee Coe eee eet eer Cees coo Information obtained through DNS footorinting [mee es Dee ae eee ers Peer Percent Pr Popes aor Footprinting Pen Testing Report Templates (Conra) afi DNS Re ec aa ened Sens Ce on nd Sere ey Cee eas Ase Coy Information obtained through social networking sites een Ronee aad Ce es Educational and employment backgrounds: co Ce ee ee eeeModule Summary TE Footprinting is the process of collecting as much information as possible about a target network, for identifying various ways to intrude into an organization’s network system 1 Itreduces attacker's attack area to specific range of IP address, networks, domain names, remote access, etc. 1 Attackers use search engines to extract information about a target Information obtained from target’s website enables an attacker to build a detailed map of website's structure and architecture O Competitive intelligence is the process of identifying, gathering, analyzing, verifying, and using information about your competitors from resources such as the Internet DNS records provide important inform: n about location and type of servers (1 Attackers conduct traceroute to extract information about: network topology, trusted routers, and firewall locations Attackers gather sensitive information through social engineering on social networking websites such as Facebook, MySpace, Linkedin, Twitter, Pinterest, Google+, etc. eee enn eee ce
You might also like
Shadow Work Journal Free PDF
PDF
91% (164)
Shadow Work Journal Free PDF
30 pages
Hourglass Workout Program by Luisagiuliet 2
PDF
76% (21)
Hourglass Workout Program by Luisagiuliet 2
51 pages
Book of Wisdom 2
PDF
87% (165)
Book of Wisdom 2
70 pages
BLING A Novel by Erica Kennedy
PDF
100% (18)
BLING A Novel by Erica Kennedy
468 pages
Book of Wisdom Revival of Wisdom
PDF
89% (93)
Book of Wisdom Revival of Wisdom
72 pages
12 Week Program: Summer Body Starts Now
PDF
87% (46)
12 Week Program: Summer Body Starts Now
70 pages
Knee Ability Zero Now Complete As A Picture Book 4 PDF Free
PDF
94% (68)
Knee Ability Zero Now Complete As A Picture Book 4 PDF Free
49 pages
Aussie Fitness - Low Calorie High Protein Recipes (BOOTLEG)
PDF
100% (12)
Aussie Fitness - Low Calorie High Protein Recipes (BOOTLEG)
462 pages
The Hold Me Tight Workbook - Dr. Sue Johnson
PDF
100% (16)
The Hold Me Tight Workbook - Dr. Sue Johnson
187 pages
GB Level Up Guide 3 Elevate PDF
PDF
79% (28)
GB Level Up Guide 3 Elevate PDF
115 pages
Read People Like A Book by Patrick King-Edited
PDF
58% (78)
Read People Like A Book by Patrick King-Edited
12 pages
Livingood, Blake - Livingood Daily Your 21-Day Guide To Experience Real Health
PDF
77% (13)
Livingood, Blake - Livingood Daily Your 21-Day Guide To Experience Real Health
260 pages
Cheat Code To The Universe
PDF
94% (79)
Cheat Code To The Universe
34 pages
Facial Gains Guide (001 081)
PDF
91% (45)
Facial Gains Guide (001 081)
81 pages
No Grid Survival Projects - Sophia Hall
PDF
91% (11)
No Grid Survival Projects - Sophia Hall
126 pages
Curse of Strahd
PDF
95% (467)
Curse of Strahd
258 pages
The Psychiatric Interview - Daniel Carlat
PDF
91% (34)
The Psychiatric Interview - Daniel Carlat
473 pages
The Ultimate Prepared Bug in Guide
PDF
100% (5)
The Ultimate Prepared Bug in Guide
149 pages
Mandate For Leadership Policy Recommendations
PDF
77% (62)
Mandate For Leadership Policy Recommendations
19 pages
Can't Hurt Me
PDF
69% (29)
Can't Hurt Me
10 pages
The Borax Conspiracy
PDF
91% (57)
The Borax Conspiracy
14 pages
Carl Hart, Charles Ksir - Drugs, Society, and Human Behavior (2015)
PDF
100% (17)
Carl Hart, Charles Ksir - Drugs, Society, and Human Behavior (2015)
495 pages
Couples Therapy Workbook
PDF
95% (44)
Couples Therapy Workbook
157 pages
Dare To Lead by Brené Brown
PDF
45% (11)
Dare To Lead by Brené Brown
2 pages
Combs Indictment
PDF
91% (11)
Combs Indictment
14 pages
D&D Player Handbook 5e
PDF
96% (336)
D&D Player Handbook 5e
293 pages
Shortcut To Shred Ebook Revised 9-9-2015 PDF
PDF
88% (8)
Shortcut To Shred Ebook Revised 9-9-2015 PDF
15 pages
Workbook For Adult Children of Emotionally Immature Parents - How To Heal From Distant, Rejecting, or Self-Involved Parents
PDF
88% (16)
Workbook For Adult Children of Emotionally Immature Parents - How To Heal From Distant, Rejecting, or Self-Involved Parents
77 pages
Five Wishes (Rev 06.2011)
PDF
57% (7)
Five Wishes (Rev 06.2011)
12 pages
Trauma-Focused ACT - Russ Harris
PDF
95% (39)
Trauma-Focused ACT - Russ Harris
568 pages
Anastasia: The New Broadway Musical (LIBRETTO)
PDF
94% (174)
Anastasia: The New Broadway Musical (LIBRETTO)
117 pages
COSMIC CONSCIOUSNESS OF HUMANITY - PROBLEMS OF NEW COSMOGONY (V.P.Kaznacheev,. Л. V. Trofimov.)
PDF
94% (214)
COSMIC CONSCIOUSNESS OF HUMANITY - PROBLEMS OF NEW COSMOGONY (V.P.Kaznacheev,. Л. V. Trofimov.)
212 pages
I Hate You - Don't Leave Me
PDF
80% (54)
I Hate You - Don't Leave Me
6 pages
New Oxford Annotated Bible With Apocrypha (NRSV) 4e, The - Bible
PDF
95% (61)
New Oxford Annotated Bible With Apocrypha (NRSV) 4e, The - Bible
2,440 pages
TDA Birth Certificate Bond Instructions
PDF
97% (284)
TDA Birth Certificate Bond Instructions
4 pages
Complaint - Ventura V Combs
PDF
91% (11)
Complaint - Ventura V Combs
35 pages
The Secret Language of Attraction
PDF
86% (107)
The Secret Language of Attraction
278 pages
How To Develop and Write A Grant Proposal
PDF
83% (542)
How To Develop and Write A Grant Proposal
17 pages
Supreme Mathematics
PDF
80% (25)
Supreme Mathematics
1 page
Penis Enlargement Secret
PDF
60% (124)
Penis Enlargement Secret
12 pages
Workbook For The Body Keeps The Score
PDF
88% (52)
Workbook For The Body Keeps The Score
111 pages
Blue Beam Project
PDF
70% (20)
Blue Beam Project
3 pages
CPN Tut
PDF
95% (20)
CPN Tut
23 pages
Donald Trump & Jeffrey Epstein Rape Lawsuit and Affidavits
PDF
83% (1016)
Donald Trump & Jeffrey Epstein Rape Lawsuit and Affidavits
13 pages
PussyPrayers PDF
PDF
80% (110)
PussyPrayers PDF
108 pages
KamaSutra Positions
PDF
78% (69)
KamaSutra Positions
55 pages
KamaSutra Positions
PDF
68% (84)
KamaSutra Positions
55 pages
7 Hermetic Principles
PDF
93% (30)
7 Hermetic Principles
3 pages
Into The Wild Shadow Work Journal PDF n1cr4g
PDF
96% (27)
Into The Wild Shadow Work Journal PDF n1cr4g
79 pages
27 Feedback Mechanisms Pogil Key
PDF
77% (13)
27 Feedback Mechanisms Pogil Key
6 pages
Frank Hammond - List of Demons
PDF
92% (92)
Frank Hammond - List of Demons
3 pages
Phone Codes
PDF
78% (27)
Phone Codes
5 pages
36 Questions That Lead To Love
PDF
91% (35)
36 Questions That Lead To Love
3 pages
Sample Mental Health Progress Note
PDF
96% (47)
Sample Mental Health Progress Note
3 pages
How 2 Setup Trust
PDF
97% (307)
How 2 Setup Trust
3 pages
2025 MandateForLeadership FULL
PDF
70% (10)
2025 MandateForLeadership FULL
920 pages
House of Leaves - Mark Z Danielewski
PDF
80% (20)
House of Leaves - Mark Z Danielewski
750 pages
How To Kiss A Woman's Breast
PDF
60% (114)
How To Kiss A Woman's Breast
14 pages
Singer's Anthology Master Song and Show Index 2008 PDF
PDF
37% (43)
Singer's Anthology Master Song and Show Index 2008 PDF
38 pages
(Psilocybin) How To Grow Magic Mushrooms A Simple Psilocybe Cubensis Growing Technique PDF
PDF
75% (8)
(Psilocybin) How To Grow Magic Mushrooms A Simple Psilocybe Cubensis Growing Technique PDF
48 pages
Cellular Communication POGIL
PDF
80% (10)
Cellular Communication POGIL
5 pages
36 Questions To Fall in Love 1
PDF
97% (32)
36 Questions To Fall in Love 1
2 pages
Lundy - Why Does He Do That PDF
PDF
79% (42)
Lundy - Why Does He Do That PDF
1,020 pages
The 36 Questions That Lead To Love - The New York Times
PDF
94% (34)
The 36 Questions That Lead To Love - The New York Times
3 pages
100 Questions To Ask Your Partner
PDF
80% (35)
100 Questions To Ask Your Partner
2 pages
25 Most Valuable US Pennies
PDF
94% (16)
25 Most Valuable US Pennies
4 pages
Encyclopedia of Herbal Medicine - 3rd Edition (DK Publishing) (2016)
PDF
99% (162)
Encyclopedia of Herbal Medicine - 3rd Edition (DK Publishing) (2016)
338 pages
Satanic Calendar
PDF
25% (56)
Satanic Calendar
4 pages
DBT Assignment Workbook F0220
PDF
100% (65)
DBT Assignment Workbook F0220
218 pages
Do You Like Big Girls V01
PDF
21% (24)
Do You Like Big Girls V01
161 pages
The 36 Questions That Lead To Love - The New York Times
PDF
95% (21)
The 36 Questions That Lead To Love - The New York Times
3 pages
Jeffrey Epstein39s Little Black Book Unredacted PDF
PDF
75% (12)
Jeffrey Epstein39s Little Black Book Unredacted PDF
95 pages
14 Easiest & Hardest Muscles To Build (Ranked With Solutions)
PDF
100% (7)
14 Easiest & Hardest Muscles To Build (Ranked With Solutions)
27 pages
Chart of Seasons and Months Around The World
PDF
83% (35)
Chart of Seasons and Months Around The World
1 page
The Self Confidence Workbook
PDF
96% (104)
The Self Confidence Workbook
139 pages
The Book of Enoch
PDF
100% (80)
The Book of Enoch
265 pages
Starbucks Underfilled Latte Lawsuit
PDF
68% (76)
Starbucks Underfilled Latte Lawsuit
24 pages
How To Come Up With Good Ideas For Startups - The Scribd Story and The Trip Method
PDF
87% (487)
How To Come Up With Good Ideas For Startups - The Scribd Story and The Trip Method
22 pages
ALCHEMIST
PDF
64% (14)
ALCHEMIST
4 pages
1001 Songs
PDF
70% (71)
1001 Songs
1,798 pages
Trademark License Agreement
PDF
79% (382)
Trademark License Agreement
3 pages
The 4 Hour Workweek, Expanded and Updated by Timothy Ferriss - Excerpt
PDF
23% (954)
The 4 Hour Workweek, Expanded and Updated by Timothy Ferriss - Excerpt
38 pages
Zodiac Sign & Their Most Common Addictions
PDF
63% (30)
Zodiac Sign & Their Most Common Addictions
9 pages
Cisco CCNA Lab Guide
PDF
88% (8)
Cisco CCNA Lab Guide
356 pages
Hacking Presentation
PDF
No ratings yet
Hacking Presentation
14 pages
John Spence Rmv6tf Vfinal1
PDF
No ratings yet
John Spence Rmv6tf Vfinal1
29 pages
Netlabve Real Equipment Pod Management Guide PDF
PDF
No ratings yet
Netlabve Real Equipment Pod Management Guide PDF
120 pages
IOS Introduction
PDF
No ratings yet
IOS Introduction
2 pages
Implementing Selinux As Linux Security Module Report
PDF
No ratings yet
Implementing Selinux As Linux Security Module Report
58 pages
Noncompete Agreement
PDF
87% (141)
Noncompete Agreement
2 pages