02 Ch02 Footprinting and Reconnaissance2
02 Ch02 Footprinting and Reconnaissance2
Chapter 2
Footprinting and Reconnaissance
Objectives
• Identify various techniques for performing footprinting and reconnaissance.
• Identify the methodology of footprinting and reconnaissance.
• Understanding the use of whois, and nslookup
• Describing DNS record types
• Defining and describing Google hacking
1
2/26/2024
What is Footprinting?
• Footprinting is a part of the reconnaissance process, which is used to gather
possible information about a target computer system or network.
• The Phase of footprinting involves to:
– Profiling organizations
– Collecting data about the network
– Collecting data about the host
– Collecting data about the employees and third-party partners.
– This information includes the OS used by the organization, firewalls, network
maps, IP addresses, domain name system information, security configurations of
the target machine, URLs, virtual private networks, email addresses, and phone
numbers.:
Prof. Jaafer Al Saraireh - Princess Sumaya University for Technology 3
2
2/26/2024
Footprinting Types
• (1) Active Footprinting: It is the type of Footprinting where you gather information about the
system/ application by directly interacting with the system. It describes the process of using tools
and techniques, like using the traceroute commands or a ping sweep -- Internet Control Message Protocol
sweep -- to collect data about a specific target, etc.
– When you use Active Footprinting, there is a high chance that some information, like your IP address,
is saved by the system you are trying to gather the information about.
– This often triggers the target's intrusion detection system (IDS). It takes a certain level of stealth and
creativity to evade detection successfully.
• (2) Passive Footprinting: We do not directly engage with the target. Instead, we use
search engines, social media, other websites, and Whois command to gather information
about the target.
– This method is recommended since it does not generate any log of presence on the target system
– It is a stealthier approach to footprinting because it does not trigger the target's IDS.
3
2/26/2024
4
2/26/2024
Why Footprinting?
• (1) Know Security Posture: Footprinting allows attackers to know the external security
posture of the target organizations.
• (2) Reduce Focus Area: It reduces the attacker’s focus area to the specific range of IP
addresses, networks, domain names, remote access, etc.
• (3) Identify Vulnerabilities: It allows the attacker to identify vulnerabilities in the target system
to select appropriate exploits.
• (4) Draw Network Map: It allows the attacker to draw a map of the target organization’s
network infrastructure to know about the actual environment that they are going to break
5
2/26/2024
DNS System
• In total, there are 13 main DNS root
servers, each of which is named with
the letters ‘A’ to ‘M’.
• Managing the root server is ICANN’s
responsibility (Internet Corporation
for Assigned Names and Numbers).
6
2/26/2024
7
2/26/2024
8
2/26/2024
Footprinting Methodology
9
2/26/2024
• An attacker can use various techniques as part of the Footprinting methodology to collect
information. These techniques are:
– Search Engines Footprinting – Whois Footprinting
– Web Services Footprinting – DNS Footprinting
– Social Networking Sites Footprinting – Network Footprinting
– Website Footprinting – Social Engineering Footprinting
– Email Footprinting – Whois Footprinting
Footprinting Tools
• Various tools can be used in reconnaissance or footprinting, such as:
– Whois — Queries for domain names (command line win/Linux or online such as
https://www.whois.com/whois/ , https://whois.domaintools.com/
– Nslookup — Queries DNS
– MxToolBox online: https://mxtoolbox.com/
– FOCA — Enumeration for users, files, folders, and OS information
– theHarvester — Information gathering for an Email address, subdomains, hostnames,
banners
– Shodan — Information search engine using metadata. Shodan is a search engine designed to
scan and index devices and systems connected to the internet. Unlike traditional search
engines like Google, which index web pages.
– Maltego — Information gathering
– Recon-ng — Web reconnaissance
– Censys — Search engine for information about devices on the Internet
10
2/26/2024
11