L8
L8
Reconnaissance and
System Hacking
Lecture 8
What is Footprinting
Footprinting involves passive data gathering techniques, such as searching public
websites, social media platforms, and online forums for information about the
target. This information can include company details, employee names, email
addresses, and even technical specifications of the systems they use.
Example of Footprinting Carried Out
Open Source Intelligence (OSINT): Gathering information from publicly
available sources like websites, blogs, news articles, and social media platforms.
10. Covering Tracks: Erasing or altering logs and evidence of the intrusion to
avoid detection.
Example System Hacking (Linux)
Imaginate we have a website https://test.daffodilvarsity.edu.bd and behind it a
Linux system is running. Our goal is to gain unauthorize assess to this system.
Let’s move forward with the System Hacking Process.
Reconnaissance:
Let’s ping the domain name to find out the IP address of the server behind the
domain.
Scanning and Enumeration:
Scan the IP (192.168.134.142) with a port scanner. We are using Zenmap to
find out open ports on the server.
Vulnerability Analysis
Search internet to find out is there any common vulnerability already exposed
or not. In this case we found a vulnerability and exploit of this version of FTP
software currently this Linux system is using.
Gaining Access
We read the exploit details of rapid7. The exploit is based on Metasploit
Framework (A set of exploitations tools) require a
https://www.rapid7.com/db/modules/exploit/unix/ftp/vsftpd_234_backdoor/
Gaining Access (Exploit)
Using Metasploit to gain unauthorized access (Access Gained)
Now we can process
Maintaining Access, Privilege Escalation, Covering Tracks, Data
Collection, Malicious Actions and Persistence
Questions
Thanks!