Module 02 Footprinting and Reconnaissance
Module 02 Footprinting and Reconnaissance
Module 02 Footprinting and Reconnaissance
Reconnaissance
Footprinting Terminology
• Open Source or Passive Information Gathering: Open source or
passive information gathering is the easiest way to collect
information about the target organization. It refers to the process of
gathering information from the open sources, i.e., publicly available
sources. This requires no direct contact with the target
organization. Open sources may include newspapers, television,
social networking sites, blogs, etc.
• Active Information Gathering: In active information gathering,
process attackers mainly focus on the employees of the target
organization. Attackers try to extract information from the
employees by conducting social engineering: on-site visits,
interviews, questionnaires, etc.
Footprinting Terminology cont’d
• Anonymous Footprinting: This refers to the process of collecting
information from sources anonymously so that your efforts cannot
be traced back to you.
• Pseudonymous Footprinting: Pseudonymous footprinting refers to
the process of collecting information from the sources that have
been published on the Internet but is not directly linked to the
author's name. The information may be published under a different
name or the author may have a well-established pen name, or the
author may be a corporate or government official and be prohibited
from posting under his or her original name. Irrespective of the
reason for hiding the author's name, collecting information from
such sources is called pseudonymous.
Footprinting Terminology cont’d
• Organizational or Private Footprinting: Private
footprinting involves collecting information from an
organization's web- based calendar and email
services.
• Internet Footprinting: Internet footprinting refers to
the process of collecting information of the target
organization's connections to the Internet.
What Is Footprinting?
• Footprinting, the first step in ethical hacking, refers
to the process of collecting information about a
target network and its environment. Using
footprinting you can find various ways to intrude into
the target organization's network system. It is
considered "methodological" because critical
information is sought based on a previous discovery.
Why Footprinting?
Footprinting help us to…
• Know Security Posture
• Reduce Attack Area
• Build Information Database
• Draw Network Map
Objectives of Footprinting
• Collect Network – TCP and UDP services running
Information – Access control mechanisms
– Domain name and ACLs
– – Networking protocols
Internal domain names
– – VPN points
Network blocks
– – ACLs
IP addresses of the reachable
systems – IDSes running
– Rogue websites/private – Analog/digital telephone
websites numbers
– Authentication mechanisms
– System enumeration
Objectives of Footprinting Cont’d
• Collect System Information
– User and group names
– System banners
– Routing tables
– SNMP information
– System architecture
– Remote system type
– System names
– Passwords
Objectives of Footprinting cont’d
• Collect Organization’s Information
– Employee details
– Organization's website
– Company directory
– Location details
– Address and phone numbers
– Comments in HTML source code
– Security policies implemented
– Web server links relevant to the organization
– Background of the organization
– News articles/press releases
Footprinting Threats
• Social Engineering
• System and Network Attacks
• Information Leakage
• Privacy Loss
• Corporate Espionage
• Business Loss
Footprinting Methodology
• Footprinting through Search Engines
• Website Footprinting
• Email Footprinting
• Competitive Intelligence
• Footprinting using Google
• WHOIS Footprinting
• DNS Footprinting
• Network Footprinting
• Footprinting through Social Engineering
• Footprinting through Social Networking Sites
Footprinting through Search Engines
• A web search engine is designed to search for information on the World
Wide Web. The search results are generally presented in a line of results
often referred to as search engine results pages (SERPs). In the present
world, many search engines allow you to extract a target organization's
information such as technology platforms, employee details, login pages,
intranet portals, and so on. Using this information, an attacker may build a
hacking strategy to break into the target organization's network and may
carry out other types of advanced system attacks
• If you want to footprint the target organization, for example XYZ pvt ltd,
then type XYZ pvt ltd in the Search box of the search engine and press
Enter. This will display all the search results containing the keywords "XYZ
pvt ltd." You can even narrow down the results by adding a specific
keyword while searching. Furthermore, we will discuss other footprinting
techniques such as website footprinting and email Footprinting.
Finding Company’s External and
Internal URLs
• A company's external and internal URLs provide a lot of useful
information to the attacker. These URLs describe the company
and provide details such as the company mission and vision,
history, products or services offered, etc. The URL that is used
outside the corporate network for accessing the company's
vault server via a firewall is called an external URL. It links
directly to the company's external web page. The target
company's external URL can be determined with the help of
search engines such as Google or Bing.
Cont’d
• Tools to Search Internal URLs:
– Netcraft
– Link Extractor
Public and Restricted Websites
• A public website is a website designed to show the presence
of an organization on the Internet. It is designed to attract
customers and partners. It contains information such as
company history, services and products, and contact
information of the organization.
• A restricted website is a website that is available to only a few
people. The people may be employees of an organization,
members of a department, etc. Restrictions can be applied
based on the IP number, domain or subnet, username, and
password
Public and Restricted Websites
cont’d
• Restricted or private websites of
microsoft.com include:
http://technet.microsoft.com,
http://windows.microsoft.com,
http://office.microsoft.com, and
http://answers.microsoft.com.
Collect Location Information
• Information such as physical location of the organization plays
a vital role in the hacking process. This information can be
obtained using the footprinting technique. In addition to
physical location, we can also collect information such as
surrounding public Wi-Fi hotspots that may prove to be a way
to break into the target organization's network.
• Attackers with the knowledge of a target organization's
location may attempt dumpster diving, surveillance, social
engineering, and other non-technical attacks to gather much
more information about the target organization.
• Example: earth.google.com
People Search
• You can use the public record websites to find information
about people's email addresses, phone numbers, house
addresses, and other information. Using this information
you can try to obtain bank details, credit card details, mobile
numbers, past history, etc.
People Search Online Services
• Zaba Search • PeekYou
• Zoomlnfo • Intelius
• Wink People Search • W PeopleSmart
• AnyWho • WhitePages
• People Lookup • Justdial
• 123 People Search
People Search on Social
Networking Services
• Searching for people on social networking websites is
easy. Social networking services are the online
services, platforms, or sites that focus on facilitating
the building of social networks or social relations
among people. These websites provide information
that is provided by users. Here, people are directly or
indirectly related to each other by common interest,
work location, or educational communities, etc.
Cont’d
• Some of social networking services are as
follows:
– Facebook
– LinkedIn
– Twitter
– Google+
Gather Information from Financial
Services
• Financial services such as Google Finance, Yahoo! Finance,
and so on provide a lot of useful information such as the
market value of a company's shares, company profile,
competitor details, etc. The information offered varies from
one service to the next. In order to avail themselves of
services such as e-mail alerts and phone alerts, users need to
register on the financial services. This gives an opportunity for
an attacker to grab useful information for hacking.
Footprinting through Job Sites
• Attackers can gather valuable information about the operating
system, software versions, company's infrastructure details,
and database schema of an organization, through footprinting
various job sites using different techniques. Depending upon
the posted requirements for job openings, attackers may be
able to study the hardware, network-related information, and
technologies used by the company. Most of the company's
websites have a key employees list with their email addresses.
This information may prove to be beneficial for an attacker.
For example, if a company wants to hire a person for a
Network Administration job, it posts the requirements
related to that position.
Usually attackers look for the following information:
• Job requirements
• Employee's profile
• Hardware information
• Software information
Examples of job websites include:
• http://www.monsterindia.com
• http://www.jobsisjob.com
• http://www.naukri.com
• http://www.timesjob. com
Monitoring Targets Using Alerts
• Alerts are the content monitoring services that provide
automated up-to-date information based on your preference,
usually via email or SMS. In order to get alerts, you need to
register on the website and you should submit either an email
or phone number to the service. Attackers can gather this
sensitive information from the alert services and use it for
further processing of an attack.
• Google Alerts
• Yahoo! Alerts
• Giga Alert
Website Footprinting
• It is possible for an attacker to build a detailed map of a
website's structure and architecture without IDS being
triggered or without raising any sys admin suspicions
• Using the Netcraft tool you can gather website information
such as IP address, registered name and address of the
domain owner, domain name, host of the site, OS details, etc.
But this tool may not give all these details for every site. In
such cases, you should browse the target website.
Mirroring an Entire Website
• Website mirroring is the process of creating an exact
replica of the original website. This can be done with
the help of web mirroring tools. These tools allow
you to download a website to a local directory,
recursively building all directories, HTML, images,
flash, videos and other files from the server to your
computer.
Mirroring an Entire Website cont’d
Website mirroring has the following benefits:
• It is helpful for offline site browsing.
• Website mirroring helps in creating a backup site for
the original one.
• A website clone can be created.
• Website mirroring is useful to test the site at the time
of website design and development.
Website Mirroring Tools
• HTTrack wesite copier
• SurfOffline
• BlackWidow
• Webripper etc…
Extract Website Information
• Extract Website Information from http: //www.
archive .org
– Archive is an Internet Archive Wayback Machine that
allows you to visit archived versions of websites. This
allows you to gather information on a company's web
pages since their creation. As the website www.archive.org
keeps track of web pages from the time of their inception,
you can retrieve even information that has been removed
from the target website.
Monitoring Web Updates Using
Website Watcher
• Website Watcher is used to keep track of websites
for updates and automatic changes. When an update
or change occurs, Website Watcher automatically
detects and saves the last two versions onto your
disk, and highlights changes in the text. It is a useful
tool for monitoring sites to gain competitive
advantage.
Tracking Email Communications
• Email tracking is a method that helps you to monitor as well
as to track the emails of a particular user. This kind of tracking
is possible through digitally time stamped records to reveal
the time and date a particular email was received or opened
by the target. A lot of email tracking tools are readily available
in the market, using which you can collect information such as
IP addresses, mail servers, and service provider from which
the mail was sent. Attackers can use this information to build
the hacking strategy. Examples of email tracking tools include:
eMailTrackerPro and Paraben E-mail Examiner.
Collecting Information from Email Headers