Week 7 Footprinting and Intelligence Gathering
Week 7 Footprinting and Intelligence Gathering
• Active Footprinting: Involves directly interacting with the target system to gather
information. This may involve scanning networks, querying DNS servers, or probing
systems directly.
• Passive Footprinting: Involves collecting publicly available information without
directly interacting with the target system. This can include gathering data from
websites, social media profiles, domain registries, and other public sources.
1. WHOIS Lookup:
o WHOIS is a protocol that allows you to gather information about domain names
and IP address registrations. It provides details such as the domain owner,
contact information, and name servers.
o Tools: Online WHOIS lookup tools, such as WHOIS.net, ICANN WHOIS, and
others, can help you gather domain registration information.
o Information Gathered: Organization names, contact emails, IP addresses,
name servers, domain expiration dates, etc.
2. DNS Footprinting:
o DNS (Domain Name System) footprinting involves querying DNS records to
obtain information about domain names, IP addresses, and the architecture of a
target network.
o Tools: Tools like nslookup, dig, or online DNS query tools help gather DNS
information.
o Information Gathered: A DNS lookup can return details such as IP addresses,
mail servers, domain names, subdomains, and name servers.
3. Social Media and Public Sources:
o Social media platforms, company websites, blogs, and forums often reveal
valuable information about the target’s infrastructure and personnel.
o Tools: Tools such as Maltego, Google Dorking, and LinkedIn can help
uncover publicly available information, such as employee details,
organizational structure, and infrastructure details.
o Information Gathered: Employee names, email addresses, job titles, company
structure, social media profiles, and even internal network details.
4. Network Footprinting (IP Range Mapping):
o Identifying the IP range of a target organization can help an attacker determine
the systems and devices within a network. This can be done using techniques
like network scanning and tracerouting.
o Tools: Nmap, Netdiscover, and Angry IP Scanner are tools that allow for
scanning an entire subnet for live hosts.
o Information Gathered: The range of IP addresses used by the target, which
can be used for further network reconnaissance.
5. Search Engine Footprinting (Google Dorking):
o Google Dorking involves using advanced search operators in search engines to
find specific information about a target organization, including exposed files,
documents, or sensitive data.
o Tools: Advanced search queries in Google like intitle, inurl, or filetype can be
used to find specific files, exposed servers, or vulnerabilities.
o Information Gathered: Exposed files (e.g., PDFs, Word documents,
spreadsheets), sensitive data, and system configurations that may not be
properly secured.
6. Social Engineering:
o In some cases, an attacker may attempt to gather information by directly
interacting with people inside the target organization, posing as a legitimate
person or entity to collect sensitive data.
o Techniques: Phishing, pretexting, baiting, or impersonating a trusted entity like
an IT administrator to gather information from employees.
o Information Gathered: Login credentials, network configurations, personal
information, etc.
7. Footprinting Using WHOIS, DNS, and Traceroute:
o By combining WHOIS, DNS queries, and traceroute commands, attackers can
gather information about a target’s DNS records, route path, and network
topology.
o Tools: WHOIS command, traceroute (on Linux/Unix systems), PathPing (on
Windows), or tracert can help determine routing paths and locate target servers.
8. Social Media Intelligence (OSINT - Open-Source Intelligence):
o OSINT involves collecting publicly available information from social media
platforms like Twitter, Facebook, Instagram, and even blogs. It may reveal
details about employees, internal projects, or other organizational specifics.
o Tools: Maltego, OSINT Framework, and Spokeo help to gather intelligence
from publicly available sources.
Conclusion