Download
agenda n.
Skip this Video
Loading SlideShow in 5 Seconds..
Agenda PowerPoint Presentation

Agenda

4 Vues Download Presentation
Télécharger la présentation

Agenda

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Agenda This module will familiarize you with the following: Overview of the Reconnaissance Phase Footprinting: An Introduction Information Gathering Methodology of Hackers Competitive Intelligence gathering Tools that aid in Footprinting Footprinting steps

  2. Defining Footprinting • Footprinting is the blueprint of the security profile of an organization, undertaken in a methodological manner • Footprinting is one of the three pre-attack phases. The others are scanning and enumeration • An attacker will spend 90% of the time in profiling an organization and another 10% in launching the attack • Footprinting results in a unique organization profile with respect to networks (Internet/ intranet/extranet/wireless) and systems involved

  3. Information Gathering Methodology • Unearth initial information • Locate the network range • Ascertain active machines • Discover open ports/access points • Detect operating systems • Uncover services on ports • Map the network

  4. Unearthing Initial Information • Commonly includes: • Domain name lookup • Locations • Contacts (telephone / mail) • Information sources: • Open source • Whois • Nslookup • Hacking tool • Sam Spade

  5. Finding a Company’s URL Search for a company’s URL using a search engine such as www.google.com Type the company’s name in the search engine to get the company URL Google provides rich information to perform passive reconnaissance Check newsgroups, forums, and blogs for sensitive information regarding the network

  6. Internal URL • By taking a guess, you may find an internal company URL • You can gain access to internal resources by typing an internal URL • For example: • beta.xsecurity.com • customers.xsecurity.com • products.xsecurity.com • Partners.xsecurity.com • Intranet.xsecurity.com • Asia.xsecurity.com • Namerica.xsecurity.com • Samerica.xsecurity.com • Japan.xsecurity.com • London.xsecurity.com • Hq.xsecurityc.om • Finance.xsecurity.com • www2.xsecurity.com • www3.xsecurity.com

  7. Extracting Archive 0f a Website • You can get information on a company website since its launch at www.archive.org • For example: www.microsoft.com • You can see updates made to the website • You can look for employee database, past products, press releases, contact information, and more

  8. Google Search for Company’s Info. Using Google, search company news and press releases From this information, get the company’s infrastructure details

  9. People Search • You can find personal information using • Facebook • Linkedin • Twitter • Tumblr • Spokeo • Tineye • You can get details like residential addresses, contact numbers, date of birth, and change of location • You can get satellite pictures of private residences

  10. People Search Website

  11. Polls

  12. Footprinting Through Job Sites • Job requirements • Employee profile • Hardware information • Software information • You can gather company infrastructure details from job postings • Look for company infrastructure postings such as “looking for system administrator to manage Solaris 10 network” • This means that the company has Solaris networks on site • E.g., www.jobsdb.com

  13. Footprinting Through Job Sites

  14. Competitive Intelligence Gathering “Business moves fast. Product cycles are measured in months, not years. Partners become rivals quicker than you can say ‘breach of contract.’ So how can you possibly hope to keep up with your competitors if you can't keep an eye on them?” Competitive intelligence gathering is the process of gathering information about your competitors from resources such as the Internet The competitive intelligence is non-interfering and subtle in nature Competitive intelligence is both a product and a process

  15. Why Do You Need CompetitiveIntelligence? Compare your products with that of your competitors’ offerings Analyze your market positioning compared to the competitors Pull up list of competing companies in the market Extract salesperson’s war stories on how deals are won and lost in the competitive arena Produce a profile of CEO and the entire management staff of the competitor Predict their tactics and methods based on their previous track record

  16. Public and Private Websites • A company might maintain public and private websites for different levels of access • Footprint an organization’s public www servers • Example: • www.xsecurity.com • www.xsecurity.net • www.xsecurity.net • Footprint an organization’s sub domains (private) • Example: • http://partners.xsecurity.com • http://intranet.xsecurity.com • http://channels.xsecurity.com • http://www2.xsecurity.com

  17. Whois Lookup • With whois lookup, you can get personal and contact information • For example, www.samspade.com

  18. Registrant: targetcompany (targetcompany-DOM) # Street Address City, Province State, Pin, Country Domain Name: targetcompany.COM Administrative Contact: Surname, Name (SNIDNo-ORG) targetcompany@domain.com targetcompany (targetcompany-DOM) # Street Address City, Province, State, Pin, Country Telephone: XXXXX Fax XXXXX Technical Contact: Surname, Name (SNIDNo-ORG) targetcompany@domain.com targetcompany (targetcompany-DOM) # Street Address City, Province, State, Pin, Country Telephone: XXXXX Fax XXXXX Domain servers in listed order: NS1.WEBHOST.COM XXX.XXX.XXX.XXX NS2.WEBHOST.COM XXX.XXX.XXX.XXX Whois

  19. Locate the Network Range • Commonly includes: • Finding the range of IP addresses • Discerning the subnet mask • Information Sources: • ARIN (American Registry of Internet Numbers) • Traceroute • Hacking Tool: • NeoTrace • Visual Route

  20. Summary Information gathering phase can be categorized broadly into seven phases Footprinting renders a unique security profile of a target system Whois and ARIN can reveal public information of a domain that can be leveraged further Traceroute and mail tracking can be used to target specific IP, and later for IP spoofing Nslookup can reveal specific users, and zone transfers can compromise DNS security

  21. Thank You! Stick around for Raffle & Q&As