Unit No. 2 Part1 Footprinting
Unit No. 2 Part1 Footprinting
Hacking
Footprinting & Reconnaissance
Scanning
Enumeration
System Hacking
Escalation of Privileges
Covering Tracks
Footprinting and
Reconnaissance
allows the attacker to gather the
information regarding internal and
external security architecture
Collection of information also helps
to identify the vulnerabilities within a
system, which exploits to gain
access
collection of information helps in
identifying different possible ways to
enter into the target network.
Footprinting may involve both passive and active techniques:
1. Passive Footprinting:
1. Public Information Gathering: Collecting information from
publicly available sources such as websites, social media,
domain registration records, and other public databases.
2. Network Enumeration: Discovering information about a
network or system without actively engaging with it. This can
include finding information about network architecture, IP
addresses, and domain names.
2. Active Footprinting:
1. Scanning: Involves actively probing the target network to
discover live hosts, open ports, and services running on those
ports.
2. Enumeration: Extracting more detailed information about the
target system, such as user names, network shares, and other
valuable information.
Types of Footprinting-Pseudonymous Footprinting
Official Websites
Job Advertisements
Press releases
Annual reports
Product catalogs
Analysis reports
Regulatory reports
Agents, distributors & Suppliers
Website Traffic
Monitoring Tools
Tracking Online Reputation
of the Target
Whois Look Up
Regional Internet Registries (RIR) maintain WHOIS database
RIRs Acronym
Location
African Network Information Center AFRINIC Africa
American Registry for Internet Numbers ARIN United
States, Canada, several parts of the Caribbean region, and
Antarctica
DNS Tools
WHOIS Lookup Tools for Mobile
“DNS Tools” Application by www.dnssniffers.com is
available on google play store.
It includes other features as well including DNS
Report, Blacklist Check, Email Validation, WHOIS,
ping and reverses DNS.
www.dnssniffers.com
www.ultratools.com
Whois app
Ultra tool mobile app
There are several lookup tools powered by
www.whois.com.au such as: -
WHOIS Lookup
DNS Lookup
RBL Lookup
Traceroute
IP Lookup
API/Bulk Data Access
DNS Footprinting- DNS
reconnaissance or DNS enumeration,
DNS record type symbols
DNS Footprinting
DNS footprinting is often a precursor to more
advanced attacks, such as DNS spoofing, DNS
cache poisoning, or targeted phishing
campaigns.
Therefore, organizations must implement
proper DNS security measures, including
DNSSEC (DNS Security Extensions), DNS
firewalls, and regular DNS configuration audits,
to protect against potential threats.
Extracting DNS Information using
DNSStuff
https://www.dnsstuff.com
DNS Query Types: DNS footprinting involves
querying DNS servers for various types of
information, such as:
• Forward DNS Lookup: Mapping domain names to
IP addresses.
• Reverse DNS Lookup: Mapping IP addresses to
domain names.
• MX Records: Identifying mail servers associated
with a domain.
• NS Records: Identifying authoritative name
servers for a domain.
• SOA Records: Obtaining information about the
start of authority for a domain.
Public DNS Servers: DNS
footprinting often starts with
querying public DNS servers like
those operated by Google (8.8.8.8,
8.8.4.4) or Cloudflare (1.1.1.1) to
gather basic information about the
target domain. These servers can
provide valuable information about a
domain's DNS configuration.
Zone Transfers: If a DNS server is
misconfigured to allow zone
transfers, an attacker can potentially
retrieve a complete list of domain
names, IP addresses, and other DNS
records associated with the target
domain.
This information can be used to
identify potential targets within the
network.
DNS Enumeration Tools: There are
various tools available that automate the
process of DNS footprinting, such as:
• Dig: A command-line DNS querying tool
available on Unix-like operating systems.
• NSLookup: A command-line tool available
on Windows for querying DNS servers.
• DNSRecon: A popular DNS
reconnaissance tool that automates the
process of querying DNS servers and
analyzing the results.
Network footprinting
gain information about the target network
Using these tools, you can extract information such as: -
Network address ranges
Hostnames
Exposed hosts
OS and application version information
Patch state of the host and the applications
Structure of the applications and back-end servers
Tools for this purpose are listed below: -
Whois
Ping
Nslookup
Tracert
Traceroute Tools
Tracert options are available in all operating system
as a command line feature.
Visual traceroute, graphical and other GUI based
traceroute applications are also available.
Traceroute or Tracert command results in the
path information from source to destination in the
hop by hop manner.
The result includes all hops in between source to
destination.
The result also includes latency between these hops.
Traceroute Tools
Footprinting through Social
Engineering
Eavesdropping
Shoulder Surfing
Dumpster Diving
Impersonation
Footprinting Tool
Maltego
Maltego is a data mining tools that are powered by Paterva.
This interactive tool gathers data and represents graphs for analysis. The
measure purpose of this Data mining tools is an online investigation of
relationships among
different pieces of information obtained from various sources lies over the
internet.
Using Transform, Maltego automate the process of gathering information
from different data sources.
Nodes based graph represents this information.
There is 3 version of Maltego Client software: -
Maltego CE
Maltego Classic
Maltego XL
Countermeasures of Footprinting
To identify
live hosts on a network
open & closed ports
operating system information
services running on a network
running processes on a network
the presence of Security Devices like
firewalls
System architecture
running services
vulnerabilities
Scanning Networks
TCP Communication
TCP Flags
3 Way Handshake
Protocol
Colasoft Packet Builder
Colasoft Packet Builder software enables to create
the customized network packets.
These Customized Network packets can penetrate the
network for attacks.
Customization can also use to create fragmented
packets. You can download the software from
www.colasoft.com.
Colasoft packet builder offers Import and Export
options for a set of packets.
You can also add a new packet by clicking
Add/button.
Select the Packet type from the drop-down
option. Available options are: -
ARP Packet
IP Packet
TCP Packet
UDP Packet
Scanning Methodology
Ping
Nmap
Nmap-ZenMap GUI
Advanced IP Scanner
nmap –sP –PE –PA<port
numbers> <starting IP/ending
IP>
ICMP Scanning
Full
Open Scanning
nmap –sT <ip address or range>
Stealth Scan (Half-open
Scan)
Stealth Scan (Half-open
Scan)
nmap –sS <ip address or range>
Inverse TCP Flag Scanning
ID Server
Netcraft
Netcat
Telnet
Xprobe
pof
Maltego
Draw Network Diagrams
Proxy Servers
Proxy Chaining
Proxy Tool
1. Proxy Switcher
2. Proxy Workbench
3. TOR
4. CyberGhost
Proxy Tools for Mobile
Prepare Proxies
Introduction to
Anonymizers
Censorship Circumvention Tool
Tails
Anonymizers for Mobile
Orbot
Psiphon
Open door
Spoofing IP Address
Spoofing IP Address
Enumeration