Lecture 3 Reconnaisance
Lecture 3 Reconnaisance
Active Passive
• Performing whois lookup • Finding the information through
• Extracting DNS information search engines
• Performing Traceroute analysis • Searching the people through
the people search services
• Performing Social Engineering
• Searching the infrastructure
• Harvesting Email Lists details of a company through job
sites
Objectives of Footprinting
• Domain name
• IP Addresses
• Namespaces
• Employee information
• Phone numbers
• E-mails
• Job Information
Footprinting Methodology
• Footprinting through search engines
• Footprinting through web services
• Footprinting through social networking sites
• Website Footprinting
• Email Footprinting
• Whois Footprinting
• DNS Footprinting
• Network Footprinting
• Footprinting through Social Engineering
Footprinting through
search engines
Footprinting through search engines
• Attackers use the search engines such as Google, Bing, and Yahoo to extract
information about a target.
• Attackers can use advanced search operators available with these search engines
and create complex queries.
Using the cache operator, you can find the most recent cache of a specified webpage.
Example:
cache:websitename.com
Allintext:
This operator will help you find whether all the terms that you are looking for shows up in the text of that page. This
operator, however, isn’t pin-accurate because it won’t look for text that appears close together on the page.
Example:
If you need more specific results from a single website, this command brings those results up.
For example, if you wanted to search your favorite SEO website for articles on 404 errors, you would use the following:
Info:
This one will help you find information related to the domain you are searching for.
With this, you can identify things like pages with the domain text on-page (not necessarily linked), similar on-site pages, and
the website’s cache.
Example:
"info:domainname.com"
Footprinting through IoT search engines
Internet of Things ( IoT) search engines crawls the internet for IoT devices that are
publicly accessible. Through a basic search on these search engines, an attacker gain
control of SCADA systems. Traffic control systems, internet-connected household
appliances, industrial appliances, CCTV cameras, etc.
With the help of IoT search engines such as , an attacker can obtain information such
as manufacturer details, geographical location, IP address, hostname, and ports of the
target device.
Footprinting
through social
networking sites
Footprinting through social networking sites
Attackers use social engineering tricks to gather sensitive information from social
networking websites such as Facebook, MySpace, LinkedIn, Twitter, Pinterest,
Google+, etc.
Attackers create a fake profile and use the false identity to lure people to reveal their
sensitive information
Footprinting through job sites
Attackers use the technical information obtained through job sites such as Dice, LinkedIn, and Simply
Hired, to detect underlying vulnerabilities in the target IT infrastructure.
Email Footprinting
Email Footprinting
• Gathering email addresses related to the target organization act as an important attack
vector during the later phases of hacking
• Attackers use automated tools such as the harvester and Email Spider to collect
publicly available addresses of the target organization which helps them perform
social engineering and brute force attacks.
Who is
Footprinting
Who is Footprinting
Gather network related information such as whois about the target organization is
important when planning the attack. Whois databases are maintained by Regional
Internet Registries and contain personal information of domain owners.
• An attacker uses the DNS information to determine the key hosts in the network and
then performs social engineering attacks to gather even more information.
•Creating awareness among the employees and users about the dangers of
social engineering
•Limiting the sensitive information
•encrypting sensitive information
•using privacy services on the whois lookup database
•Disable directory listings in the web servers
•Enforcing security policies