Reconnaissance Process
Reconnaissance Process
1. WHAT IS RECONNAISSANCE
Reconnaissance definition states that it is a significant instrument as a starting point of numerous data
hacking and for penetration testing. The cycle includes gathering data about the target machine that
could be utilized to discover its blemishes, weaknesses, and security vulnerabilities.
In the process of reconnaissance, hackers tend to be like detectives, gathering data, and information to
comprehend their victims. From looking at email records to open source data, they wish to know
about the organization better than the individuals who run and look after it. They focus on the security
part of the innovation, study the shortcomings, and utilize any weakness for their potential benefit.
A) Active reconnaissance
Dynamic reconnaissance is the kind of reconnaissance where you assemble data about the
framework/application by straightforwardly connecting with the framework. At the point when
you utilize Active reconnaissance, there is a high possibility that some data like your IP address is
known by the framework you are attempting to accumulate the data about.
B) Passive reconnaissance
On account of Passive reconnaissance, you assemble data without interfacing with the
framework/application you are attempting to think about. You accumulate data through web
indexes or freely available reports. At the point when you utilize Passive reconnaissance, it is highly
unlikely that the framework would know your IP address.
Another effective way of hiding your system IP and ultimately all the associated information is to go
through a Virtual Private Network (VPN). If you configure a VPN, then the whole traffic routes
through the VPN network, so your true IP address assigned by your ISP is always hidden.
4. IP Address Ranges
Small sites may have a single IP address associated with them, but larger websites usually have
multiple IP addresses serving different domains and sub-domains.
You can obtain a range of IP addresses assigned to a particular company using American Registry for
Internet Numbers (ARIN).
HTTrack (www.httrack.com)
Black Widow (http://softbytelabs.com)
WebRipper (www.calluna-software.com)
Teleport Pro (www.tenmax.com)
GNU Wget (www.gnu.org)
Backstreet Browser (http://spadixbd.com)
Fingerprinting
The term OS fingerprinting in Ethical Hacking refers to any method used to determine what operating
system is running on a remote computer. This could be −
Active Fingerprinting − Active fingerprinting is accomplished by sending specially crafted packets to
a target machine and then noting down its response and analyzing the gathered information to
determine the target OS. In the following section, we have given an example to explain how you can
use NMAP tool to detect the OS of a target domain.
Passive Fingerprinting − Passive fingerprinting is based on sniffer traces from the remote system.
Based on the sniffer traces (such as Wireshark) of the packets, you can determine the operating
system of the remote host.
We have the following four important elements that we will look at to determine the operating system
−
TTL − What the operating system sets the Time-To-Live on the outbound packet.
Window Size − What the operating system sets the Window Size at.
DF − Does the operating system set the Don't Fragment bit.
TOS − Does the operating system set the Type of Service, and if so, at what.
By analyzing these factors of a packet, you may be able to determine the remote operating system.
This system is not 100% accurate, and works better for some operating systems than others.
Basic Steps
Before attacking a system, it is required that you know what operating system is hosting a website.
Once a target OS is known, then it becomes easy to determine which vulnerabilities might be present
to exploit the target system.
Below is a simple nmap command which can be used to identify the operating system serving a
website and all the opened ports associated with the domain name, i.e., the IP address.
$nmap -O -v tutorialspoint.com
Port Scanning
We have just seen information given by nmap command. This command lists down all the open ports
on a given server.
Ping Sweep
A ping sweep is a network scanning technique that you can use to determine which IP address from a
range of IP addresses map to live hosts. Ping Sweep is also known as ICMP sweep.
You can use fping command for ping sweep. This command is a ping-like program which uses the
Internet Control Message Protocol (ICMP) echo request to determine if a host is up.
fping is different from ping in that you can specify any number of hosts on the command line, or
specify a file containing the lists of hosts to ping. If a host does not respond within a certain time limit
and/or retry limit, it will be considered unreachable.
DNS Enumeration
Domain Name Server (DNS) is like a map or an address book. In fact, it is like a distributed database
which is used to translate an IP address 192.111.1.120 to a name www.example.com and vice versa.
DNS enumeration is the process of locating all the DNS servers and their corresponding records for
an organization. The idea is to gather as much interesting details as possible about your target before
initiating an attack.
You can use nslookup command available on Linux to get DNS and host-related information. In
addition, you can use the following DNSenum script to get detailed information about a domain −
DNSenum script can perform the following important operations −
Fingerprinting techniques
Fingerprinting techniques are based on detecting modification in packets produced by different
operating systems.
Common techniques are based on analyzing:
IP TTL values.
IP ID values.
TCP Window size.
TCP Options (generally, in TCP SYN and SYN+ACK packets).
DHCP requests.
ICMP requests.
HTTP packets (generally, User-Agent field).
Other techniques are based on analyzing:
Running services.
Open port patterns.
Tools
There are different tools that are being used for Active Stack and Passive Stack Fingerprinting.
Active Fingerprinting Tools:
1. Nmap:
Nmap is the network discovering tools that many systems and network administrators found useful for
tasks such as network inventory, managing service upgrade schedules, and monitoring host or service
uptime.
4. Satori:
Satori is one of the most frequently used passive fingerprinting programs that uses multiple protocols
for OS identification. It is available in both Windows and Linux platforms.
B) Enumeration
The enumeration in data security is the way toward extricating client names, network assets, machine
names, and different administrations from the target system. The assembled data is utilized to
distinguish the weaknesses or frail focuses on the security of the victim and afterward attempts to
misuse it.
Enumeration in information security is the process of extracting user names, machine names, network
resources, and other services from a system. All the gathered information is used to identify the
vulnerabilities or weak points in system security and then tries to exploit it.
Enumeration belongs to the first phase of Ethical Hacking, i.e., “Information Gathering”. This is a
process where the attacker establishes an active connection with the victim and try to discover as
much attack vectors as possible, which can be used to exploit the systems further.
Network shares
SNMP data, if they are not secured properly
IP tables
Usernames of different systems
Passwords policies lists
Enumerations depend on the services that the systems offer. They can be −
DNS enumeration
NTP enumeration
SNMP enumeration
Linux/Windows enumeration
SMB enumeration
C) Scanning
Scanning is one of the most famous procedures that assailants use to find services that can be used to
misuse the frameworks. All the machines associated with the LAN, through a modem or into notable
ports are discovered in scanning.
By utilizing scanning, we can investigate data, for example, what services are executed, what clients
own those administrations, are incognito logins upheld, regardless of whether certain organization
administrations require validation and other related subtleties.
During reconnaissance, an ethical hacker attempts to gather as much information about a target
system as possible, following the seven steps listed below −
B) Nikto
Nikto is a web scanner that scans for vulnerabilities that can be utilized for surveillance. It can
identify a wide range of weaknesses but at the same time is not a covert scanner. Examining with
Nikto can be successful, however, it is effectively perceptible by a prevention system or an
interruption identification.
C) Nessus
Nessus is a business scanner for vulnerabilities. Its motivation is to distinguish weak applications
running in the network and gives an assortment of insights regarding possibly exploitable weaknesses.
Nessus is a paid scanner, however, the extensive data that it gives can make it an advantageous
venture for hacking.
D) Metasploit
Metasploit is a toolkit for exploitation. It contains a wide range of modules that have pre-packaged
adventures for various vulnerabilities. With Metasploit, even a fledgling programmer can break into a
wide scope of weak machines.
E) Shodan
Shodan is a web crawler for web associated devices. As the Internet of Things develops, people and
associations progressively are interfacing uncertain gadgets to the web. It is a tool that can be used for
Passive reconnaissance. However, using Shodan can be identified by prevention and detection
systems.
F) Google
In the tools used for passive reconnaissance, search engines come first. Google and other Search
engines can perform more remarkable pursuits than one might suspect and one has experienced. It
very well may be utilized by programmers and assailants to accomplish something that has been
named Google hacking. Fundamental inquiry strategies joined with cutting edge administrators can do
incredible harm.
G) OpenVAS
OpenVAS is a scanner for vulnerabilities that were created in light of the commercialization of
Nessus. The Nessus weakness scanner was already open-source, and, when it became closed-source,
OpenVAS was made off of the last open-source form to keep on giving a free other option. Therefore,
it gives a great deal of similar usefulness as Nessus, however, may come up short on a portion of the
highlights created since Nessus was marketed.