Lec3 Footprinting
Lec3 Footprinting
Footprinting
2.1
The attacker looks for tracks and traces the target leaves about itself on the Internet
Collect as much information as possible
Types of Information
FOOTPRINTING
Value of footprinting:
Information Sources
Gain knowledge of the target’s overall security posture
Passive Footprinting/OSINT Create a “bird’s eye” view of the target
Search for anything that might help you gain access to the target’s network: Company website(s)
General company information Whois
Company mission, products, services, activities, location, contact information
https://osintframework.com/
Cybersecurity framework search engine Cyberspace search engine
Assembles the information from publicly available sources Combines several data gathering tools into a full-service online platform
Users can get data directly from Spyse’s web interface or their API
Has free and paid features
During the COVID-19 crisis Maltego was used to aid virus containment efforts:
• Scientific study of the virus spread
• Trace tourist/visitor movement from coronavirus hotspots to other locations
Shodan.io
Search engine for Internet-connected devices
Most commonly used to help users identify potential security issues with their
devices
Can find anything that connects directly to the internet:
Routers and servers
Baby monitors
Security cameras
Maritime satellites
Water treatment facilities
Traffic light systems
Prison pay phones
Nuclear power plants
Similar to Shodan
Continually discovers Internet-
facing assets including IoT
devices
Offers cloud-based dashboard
theHarvester -d www.hackthissite.org -n -b google
OSINT tool for gathering:
[*] Emails found: 2
emails, sub-domains, hosts, employee names, open ports, and banners from different
public sources like search engines, PGP key servers, and SHODAN computer database ----------------------
ab790c1315@www.hackthissite.org
Written in Python staff@hackthissite.org
Many of its functions require an API key to effectively query the source
[*] Hosts found: 7
---------------------
0.loadbalancer.www.hackthissite.org:
22www.hackthissite.org:
2522www.hackthissite.org:
253dwww.hackthissite.org:
www.hackthissite.org:137.74.187.104, 137.74.187.100, 137.74.187.101, 137.74.187.103, 137.74.187.102
x22www.hackthissite.org:
Written in Python
Alternatively has a cloud-hosted version
Different subscription levels
ADVANCED
Google Hacking
Information about partners, vendors, suppliers, clients, etc.
Google Dorking Error messages that contain sensitive information
https://www.exploit-db.com/google-hacking-database/
Organization Description
Internet Corporation for Assigned • A not-for-profit public-benefit corporation
Names and Numbers (ICANN) • Dedicated to keeping the Internet secure, stable and
interoperable
2.4 WHOIS
Internet Authorities • Promotes competition and develops policy on the
Internet's unique identifiers
Whois • DNS names and Autonomous System (AS) numbers*
* Every major network that is part of the Internet has an identifying Autonomous System number
Governing bodies that responsible for controlling all IP addresses and domain
registrations in their operating region
American Registry for Internet Numbers (ARIN)
U.S., Canada, Antarctica and parts of the Caribbean region
African Network Information Center (AfriNIC) - Africa and the Indian Ocean
Reseaux IP Europeens Network Coordination Centre (RIPE NCC)
Europe, Russia, Central Asia, Middle East
Source: domainnamestat.com
WHOIS databases are maintained by Regional Internet Registries and hold personal whois.com • UltraTools
information of domain owners
Domainnamestat.com • SoftFuse Whois
WHOIS query
LanWhoIs • Domain Dossier
Domain name and details
Owner information Batch IP Converter • BetterWhois
DNS servers CallerIP • Whois Online
Network Blocks • Web Wiz
WhoIs Lookup Multiple Addresses
Autonomous System Numbers
WhoIs Analyzer Pro
• Network-Tools.com
When created
Expiry
• DNSstuff
HotWhoIs
Last update • Network Solutions Whois
ActiveWhoIs
Can aid attacker or ethical hacker with social engineering • WebToolHub
WhoisThisDomain
2.5 DNS
DNS Information
DNS Query Tools
Attackers use DNS data to find key hosts on the target’s network
Nslookup DNS Records
DNS record types:
dig DNSData View
A – IPv4 host address
AAAA - IPv6 host address host DNSWatch
MX – mail server
whatsmydns.net DomainTools
NS – name server
CNAME – alias myDNSTools DNS Query Utility
SOA – authority for domain
Professional Toolset DNS Lookup
SRV – service records
PTR – maps IP Address to hostname
RP – responsible person
HINFO – Host information record (CPU type/OS)
TXT – Unstructured text record
dig www.example.com
nslookup www.hackthissite.org
dig @8.8.8.8 www.example.com A
Server: 192.168.63.2 dig +short www.example.com A
Address: 192.168.63.2#53
dig example.com txt
Non-authoritative answer: dig example.com cname
Name: www.hackthissite.org dig example.com ns
Address: 137.74.187.103 dig example.com MX
Name: www.hackthissite.org dig axfr zonetransfer.me @nsztm1.digi.ninja.
Address: 137.74.187.102
2.6 WEBSITE
Google Earth Tools
Wikimapia Spiders
National Geographic Maps
Yahoo Maps
FOOTPRINTING Mirroring
Update Monitoring
Bing Maps
Use Burp Suite, Zaproxy, Paros Proxy, Website Informer, Firebug, etc. to determine: Identify personnel, hostnames, domain names, and useful data residing on exposed
Connection status and content-type web servers
Accept-Ranges and Last-Modified information Search Google, Netcraft, Shodan, LinkedIn, PGP key servers, and other sites
X-Powered-By information
Search known domain names and IP blocks
Web server version
Ncollector Studio
2.7 EMAIL
Email Source Header
Example tools:
Website Watcher
Email Tracking
Visual Ping
Follow that Page
FOOTPRINTING Email Tracking Tools
Also reveals:
Spoofed info
Bogus links and phishing techniques
Tracking emails can reveal:
EmailTrackerPro • Trace Email
PoliteMail • Email Lookup
Recipient IP address
Yesware • Pointofmail
Geolocation
ContactMonkey • WhoReadMe
Email received and read
Read duration Zendio • GetNotigy
Proxy detection ReadNotify
• G-Lock Analytics
Links
DidTheyReadit
OS and Browser info
Forwarded email
Recipient device type
$ host -t a github.io Discover routers and firewalls along the path to a target
github.io has address 185.199.109.153
Uses ICMP or UDP with an increasing TTL to elicit router identification
2.9 Attackers use social networking sites to gain important and sensitive data about
FOOTPRINTING Social Networking Sites
their target
They often create fake profiles through these social media
THROUGH Information
Aim is to lure their target and extract vulnerable information
NETWORKING
Information about their company such as potential clients and business partners, trade
secrets of business, websites, company’s upcoming news, mergers, acquisitions, etc.
Common social networking sites used:
CheckPeople Social Media groups, forums, and blogs provide more intimate information about a
person
BeenVerified Current interests
Truthfinder Current activities
Hobbies
peopleWhiz
Political and social viewpoints
PeopleLooker Can be used to cultivate a relationship with the target
Intelius Attackers create fictious profiles and attempt to join groups
Checkmate Disinformation campaigns use bots to:
Automate posting
Peoplefinders
Increase visibility of an issue
IDtrue Give malicious information traction
Make an opinion or idea seem to be popular
2.10 Recognize that once information is on the Internet, it might never fully disappear
AND
Identify information that might be harmful
Mitigation and protection methods When possible, go to the sites that publish that information and remove it
COUNTER- Use Shodan and Google Dorks to search for exposed files and devices
If any are discovered, implement protective measures
MEASURES
Set up a monitoring service such as Google Alerts to notify you if new information Conduct only private dialogues, trying to avoid public communication on forums
appears and other sites
Train yourself (and your employees) to recognize the danger and be cautious Keep a close eye on which web pages and portals you visit
about what they share on social media
Some of them may require too much information for registration: name, phone
If possible, use a data protection solution to minimize data leakage from the number, real address
company
Use different nicknames on the Internet – it will be much more difficult to find you
Turn off tracking features on your phone and configure privacy settings
Switch your profile to private mode, if the social network allows you to do this
Disable location on photos you plan to post publicly on social media
When adding friends on social media, only add people you actually know in real
Remove metadata from images if you don’t want others to know which device you life
are using to capture
INTRO TO
2.11
• Footprinting gathers as much information as possible about a target in advance of
• ETHICAL
the attack
You’re looking for any information that can help you break into the target network
FOOTPRINTING •
• HACKING
Footprinting can be passive or active
It’s usually subtle / unnoticeable
AND Review •
REVIEW
Small, random, seemingly unimportant details can together paint a bigger picture
or become important later in your hacking efforts
REVIEW •
•
Whois
WebsitesETHICAL •
•
Advanced online services
DNS
•
•
HACKING
Social media
Social networking sites
•
•
Email
Competitive intelligence sites
•
REVIEW
Job boards • Limited social engineering
INTRO TO
• OSINT is the use of publicly available sources and tools to footprint a target
INTRO TO
ETHICAL ETHICAL
• You can examine email headers and use email tracking tools to identify the actual
• You can perform advanced Google searches using “dorks” (search strings with source of an email
advanced operators)
TheHACKING HACKING
• You can use Whois, traceroute, and other tools to identify IP blocks, the firewall IP
• Google Hacking Database (GHDB) lists popular dorks created by the community address, and other network-available points of entry to the target
•
•
REVIEW
Whois is a protocol for searching domain registration information
You can use dig, nslookup, and many other tools to query a DNS server for host
•
REVIEW
Social networking sites and social media can provide a wealth of information
information
•
•
INTRO TO
You can footprint websites through the use of:
Spiders that automatically crawl through a website looking for
specific types of information
INTRO TO
• ETHICAL
Site mirroring so you can take your time examining an offline copy
of the website
ETHICAL
•
HACKING
Tools like dirb and DirBuster that attempt to uncover hidden
subdirectories on a website HACKING
REVIEW REVIEW
• Google cache and archive.org that maintain snapshots of websites
over time