Chapter 4 Foot printing and Social Engineering. Objectives After reading this chapter and completing...

48
Chapter 4 Footprinting and Social Engineering

Transcript of Chapter 4 Foot printing and Social Engineering. Objectives After reading this chapter and completing...

Page 1: Chapter 4 Foot printing and Social Engineering. Objectives After reading this chapter and completing the exercises, you will be able to: Use Web tools.

Chapter 4Footprinting and Social

Engineering

Page 2: Chapter 4 Foot printing and Social Engineering. Objectives After reading this chapter and completing the exercises, you will be able to: Use Web tools.

ObjectivesAfter reading this chapter and completing the

exercises, you will be able to:Use Web tools for footprintingConduct competitive intelligenceDescribe DNS zone transfersIdentify the types of social engineering

Hands-On Ethical Hacking and Network Defense, Second Edition 2

Page 3: Chapter 4 Foot printing and Social Engineering. Objectives After reading this chapter and completing the exercises, you will be able to: Use Web tools.

Using Web Tools for FootprintingFootprinting is a technique used to find

information about a company’s network. This information helps security testers get a better idea about the network before starting a security test

“Case the joint”Look over the locationFind weakness in security systemsTypes of locks and alarms used

FootprintingFinding information on company’s networkPassive and nonintrusiveSeveral available Web toolsHands-On Ethical Hacking and Network Defense, Second Edition 3

Page 4: Chapter 4 Foot printing and Social Engineering. Objectives After reading this chapter and completing the exercises, you will be able to: Use Web tools.

Hands-On Ethical Hacking and Network Defense, Second Edition 4

Table 4-1 Summary of Web tools

Page 5: Chapter 4 Foot printing and Social Engineering. Objectives After reading this chapter and completing the exercises, you will be able to: Use Web tools.

5Table 4-1 Summary of Web tools (cont’d.)

Page 6: Chapter 4 Foot printing and Social Engineering. Objectives After reading this chapter and completing the exercises, you will be able to: Use Web tools.

Conducting Competitive IntelligenceCompetitive intelligence: Many companies

use this technique to find out information about their competitors. With the advent of technology, competitive intelligence has been raised to a higher level

Numerous resources to find information legally

Security professionals must:Explain methods used to gather information

Have a good understanding of methods

Hands-On Ethical Hacking and Network Defense, Second Edition 6

Page 7: Chapter 4 Foot printing and Social Engineering. Objectives After reading this chapter and completing the exercises, you will be able to: Use Web tools.

Analyzing a Company’s Web SiteNetwork attacks often begin by gathering

information from a company’s Web site because Web pages are an easy way for attackers to discover critical information about an organization.

Many tools are available free. Paros is a powerful tool for UNIX and Windows OSs that can be downloaded free but it requires Java J2SE

Hands-On Ethical Hacking and Network Defense, Second Edition 7

Page 8: Chapter 4 Foot printing and Social Engineering. Objectives After reading this chapter and completing the exercises, you will be able to: Use Web tools.

Hands-On Ethical Hacking and Network Defense, Second Edition 8

Figure 4-1 The main window of Paros

Page 9: Chapter 4 Foot printing and Social Engineering. Objectives After reading this chapter and completing the exercises, you will be able to: Use Web tools.

Analyzing a Company’s Web Site (cont’d.)

Paros: searching for a Web siteClick Tools, SpiderEnter Web site’s URLCheck results

Hands-On Ethical Hacking and Network Defense, Second Edition 9

Page 10: Chapter 4 Foot printing and Social Engineering. Objectives After reading this chapter and completing the exercises, you will be able to: Use Web tools.

Hands-On Ethical Hacking and Network Defense, Second Edition 10

Figure 4-2 Entering a URL in the Input dialog box

Page 11: Chapter 4 Foot printing and Social Engineering. Objectives After reading this chapter and completing the exercises, you will be able to: Use Web tools.

Hands-On Ethical Hacking and Network Defense, Second Edition 11

Figure 4-3 Displaying filenames of all Web pages on a site

Page 12: Chapter 4 Foot printing and Social Engineering. Objectives After reading this chapter and completing the exercises, you will be able to: Use Web tools.

Analyzing a Company’s Web Site (cont’d.)Paros: getting Web site structure

Click Tree, Scan AllReport includes:

Vulnerabilities Risk levels

Gathering information this way: Time consuming

Hands-On Ethical Hacking and Network Defense, Second Edition 12

Page 13: Chapter 4 Foot printing and Social Engineering. Objectives After reading this chapter and completing the exercises, you will be able to: Use Web tools.

Hands-On Ethical Hacking and Network Defense, Second Edition 13

Figure 4-4 The Paros scanning report

Page 14: Chapter 4 Foot printing and Social Engineering. Objectives After reading this chapter and completing the exercises, you will be able to: Use Web tools.

Using Other Footprinting ToolsWhois

Commonly used Gathers IP address

and domain information

Attackers can also use it

Hands-On Ethical Hacking and Network Defense, Second Edition 14

Figure 4-5 Viewing information with the SamSpade Whois utility

Page 15: Chapter 4 Foot printing and Social Engineering. Objectives After reading this chapter and completing the exercises, you will be able to: Use Web tools.

Hands-On Ethical Hacking and Network Defense, Second Edition 15

Activity 4-1: Using Footprinting Tools

Time Required: 30 minutesObjective: Learn how to use footprinting tools, such as the SamSpadeWhois utility.

http://who.is/whois/samspade.org

Page 16: Chapter 4 Foot printing and Social Engineering. Objectives After reading this chapter and completing the exercises, you will be able to: Use Web tools.

Using E-mail AddressesBased on an e-mail account listed in DNS output, you

might discover that the company’s e-mail address format is first name initial, followed by last name and the @companyname.com sequence.

You can guess other employees’ e-mail accounts by getting a company phone directory or searching the Internet for any @companyname.com references.

Groups.google.com is the perfect tool for this job.

Hands-On Ethical Hacking and Network Defense, Second Edition 16

Page 17: Chapter 4 Foot printing and Social Engineering. Objectives After reading this chapter and completing the exercises, you will be able to: Use Web tools.

Using HTTP Basics

Hands-On Ethical Hacking and Network Defense, Second Edition 17

HTTP operates on port 80. A security tester can pull information from a Web

server by using HTTP commands. You’ve probably seen HTTP client error codes

before, such as 404 Not Found. A basic understanding of HTTP can be beneficial to

security testers, and you don’t have to learn too many codes to get data from a Web server.

If you know the return codes a Web server generates, you can determine what OS is used on the computer where you’re conducting a security test

Page 18: Chapter 4 Foot printing and Social Engineering. Objectives After reading this chapter and completing the exercises, you will be able to: Use Web tools.

18Table 4-2 HTTP client errors

Page 19: Chapter 4 Foot printing and Social Engineering. Objectives After reading this chapter and completing the exercises, you will be able to: Use Web tools.

Hands-On Ethical Hacking and Network Defense, Second Edition 19

Table 4-3 HTTP server errors

Page 20: Chapter 4 Foot printing and Social Engineering. Objectives After reading this chapter and completing the exercises, you will be able to: Use Web tools.

Hands-On Ethical Hacking and Network Defense, Second Edition 20

Table 4-4 HTTP methods

Page 21: Chapter 4 Foot printing and Social Engineering. Objectives After reading this chapter and completing the exercises, you will be able to: Use Web tools.

Hands-On Ethical Hacking and Network Defense, Second Edition 21

Figure 4-6 Using the OPTIONS HTTP method

Page 22: Chapter 4 Foot printing and Social Engineering. Objectives After reading this chapter and completing the exercises, you will be able to: Use Web tools.

Hands-On Ethical Hacking and Network Defense, Second Edition 22

Figure 4-7 Using the HEAD HTTP method

Page 23: Chapter 4 Foot printing and Social Engineering. Objectives After reading this chapter and completing the exercises, you will be able to: Use Web tools.

Other Methods of Gathering InformationWith just a URL, you can determine:

Web server OS Names of IT personnel

Other methods:CookiesWeb bugs

Hands-On Ethical Hacking and Network Defense, Second Edition 23

Page 24: Chapter 4 Foot printing and Social Engineering. Objectives After reading this chapter and completing the exercises, you will be able to: Use Web tools.

Detecting Cookies and Web Bugs

Hands-On Ethical Hacking and Network Defense, Second Edition 24

A cookie is a text file generated by a Web server and stored on a user’s browser.

The information in this file is sent back to the Web server when the user returns to the Web site. For example, a returning customer can be

shown a customized Web page when he or she revisits an online store’s Web site.

Some cookies can cause security issues because unscrupulous people might store personal information in cookies that can be used to attack a computer or server.

Page 25: Chapter 4 Foot printing and Social Engineering. Objectives After reading this chapter and completing the exercises, you will be able to: Use Web tools.

Detecting Cookies and Web Bugs

Hands-On Ethical Hacking and Network Defense, Second Edition 25

o A Web bug is a 1-pixel by 1-pixel image file referenced in an <IMG> tag, and it usually works with a cookie.

o Its purpose is similar to that of spyware and adware: to get information about the person visiting the Web site, such as an IP address, the time the Web bug was viewed, and the type of browser used to view the page.

o All this information can be useful to hackers. o Web bugs are not from the same Web site as the

Web page creator.o They come from third-party companies specializing

in data collection.

Page 26: Chapter 4 Foot printing and Social Engineering. Objectives After reading this chapter and completing the exercises, you will be able to: Use Web tools.

Detecting Cookies and Web Bugs

Hands-On Ethical Hacking and Network Defense, Second Edition 26

oBecause Web bugs are just another image file, usually a GIF, they can’t be blocked by a browser or rejected by a user.

oAlso, Web bugs usually match the color of the Web page’s background, which renders them invisible.

o If you don’t have a tool for detecting Web bugs, usually the only way to find them is examining the Web page’s source code to find a file in an <IMG> tag loading from a different Web server than other image files on the page.

Page 27: Chapter 4 Foot printing and Social Engineering. Objectives After reading this chapter and completing the exercises, you will be able to: Use Web tools.

Using Domain Name Service Zone Transfers

27

Another way to gather information when footprinting a network is through Domain Name System (DNS).

DNS is the network component responsible for resolving hostnames to IP addresses and vice versa.

People would much rather memorize a URL than an IP address.

DNS is a major area of potential vulnerability for network attacks.

After you determine what name server a company is using, you can attempt to transfer all the records for which the DNS server is responsible

This process, called a zone transfer, can be done with the Dig command.

Page 28: Chapter 4 Foot printing and Social Engineering. Objectives After reading this chapter and completing the exercises, you will be able to: Use Web tools.

Using Domain Name Service Zone Transfers

28

To determine a company’s primary DNS server, you can look for a DNS server containing a Start of Authority (SOA) record.

An SOA record shows for which zones or IP addresses the DNS server is responsible.

After you determine the primary DNS server, you can perform another zone transfer to see all host computers on the company network.

In other words, the zone transfer give you an organization’s network diagram.

You can use this information to attack other servers or computers that are part of the network infrastructure

Page 29: Chapter 4 Foot printing and Social Engineering. Objectives After reading this chapter and completing the exercises, you will be able to: Use Web tools.

29Figure 4-9 Using the Dig command

Page 30: Chapter 4 Foot printing and Social Engineering. Objectives After reading this chapter and completing the exercises, you will be able to: Use Web tools.

Hands-On Ethical Hacking and Network Defense, Second Edition 30

Page 31: Chapter 4 Foot printing and Social Engineering. Objectives After reading this chapter and completing the exercises, you will be able to: Use Web tools.

Introduction to Social EngineeringSocial engineering means using knowledge of

human nature to get information from peopleOlder than computers

Targets human component of a networkGoals

Obtain confidential information (passwords)Obtain other personal information

TacticsPersuasionIntimidation (threats)Coercion (Pressure, force)Extortion/blackmailing

Hands-On Ethical Hacking and Network Defense, Second Edition 31

Page 32: Chapter 4 Foot printing and Social Engineering. Objectives After reading this chapter and completing the exercises, you will be able to: Use Web tools.

Introduction to Social EngineeringBiggest security threat

Most difficult to protect againstMain idea:

“Why try to crack a password when you can simply ask for it?” Users divulge passwords to IT personnel

Human behavior studiedPersonality traitsBody language

Hands-On Ethical Hacking and Network Defense, Second Edition 32

Page 33: Chapter 4 Foot printing and Social Engineering. Objectives After reading this chapter and completing the exercises, you will be able to: Use Web tools.

Introduction to Social EngineeringTechniques

UrgencyQuid pro quo “Give and take”Status quo “Everyone else is doing it, so you

should, too.” KindnessPosition

Train users Not to reveal informationTo verify caller identity

Ask questions and call back to confirmHands-On Ethical Hacking and Network Defense, Second Edition 33

Page 34: Chapter 4 Foot printing and Social Engineering. Objectives After reading this chapter and completing the exercises, you will be able to: Use Web tools.

The Art of Shoulder SurfingAnother method social engineers use to gain access

to information is shoulder surfing. A shoulder surfer is skilled at reading what users

enter on their keyboards, especially logon names and passwords. This skill certainly takes practice, but with enough

time, it can be mastered easily. Shoulder surfers also use this skill to read PINs

entered at ATMs or to detect long-distance authorization codes that callers dial.

ATM theft is much easier than computer shoulder surfing because a keypad has fewer characters to memorize than a computer keyboard.

34

Page 35: Chapter 4 Foot printing and Social Engineering. Objectives After reading this chapter and completing the exercises, you will be able to: Use Web tools.

The Art of Shoulder SurfingIf the person throws away the receipt in a

trash can near the ATM, the shoulder surfer can match the PIN with an account number and then create a fake ATM card.

Often shoulder surfers use binoculars or high-powered telescopes to observe PINs being entered, making it difficult to protect against this attack.

35

Page 36: Chapter 4 Foot printing and Social Engineering. Objectives After reading this chapter and completing the exercises, you will be able to: Use Web tools.

The Art of Shoulder SurfingMany keyboard users don’t follow the

traditional fingering technique taught in typing classes. Instead, they hunt and peck with two or three fingers.

However, shoulder surfers train themselves to memorize key positions on a standard keyboard.

Shoulder surfers also know the popular letter substitutions most people use when creating passwords: $ for s, @ for a, 1 for i, 0 for o, and so forth. Hands-On Ethical Hacking and Network Defense,

Second Edition 36

Page 37: Chapter 4 Foot printing and Social Engineering. Objectives After reading this chapter and completing the exercises, you will be able to: Use Web tools.

The Art of Shoulder SurfingMany users think p@$$w0rd is difficult to guess, but

it’s not for a skilled shoulder surfer. In addition, many users are required to use

passwords containing special characters, and often they type these passwords more slowly to make sure they enter the correct characters.

Slower typing makes a shoulder surfer’s job easier

37

Page 38: Chapter 4 Foot printing and Social Engineering. Objectives After reading this chapter and completing the exercises, you will be able to: Use Web tools.

The Art of Shoulder SurfingTo help prevent shoulder-surfing attacks, you must

educate users not to type logon names and passwords when someone is standing directly behind them.

You should also caution users about typing passwords when someone nearby is talking on a cell phone because of the wide availability of camera phones.

make sure all computer monitors face away from the door or the cubicle entryway.

Warn your users to change their passwords immediately if they suspect someone might have observed them entering their passwords.

38

Page 39: Chapter 4 Foot printing and Social Engineering. Objectives After reading this chapter and completing the exercises, you will be able to: Use Web tools.

The Art of Dumpster DivingAttacker finds information in victim’s trash

Discarded computer manualsPasswords jotted downCompany phone directoriesCalendars with schedulesFinancial reportsInteroffice memosCompany policyUtility billsResumes

Hands-On Ethical Hacking and Network Defense, Second Edition 39

Page 40: Chapter 4 Foot printing and Social Engineering. Objectives After reading this chapter and completing the exercises, you will be able to: Use Web tools.

The Art of Dumpster Diving (cont’d.)Prevention

Educate users Dumpster diving Proper trash disposal

Some techniques:

Hands-On Ethical Hacking and Network Defense, Second Edition 40

Page 41: Chapter 4 Foot printing and Social Engineering. Objectives After reading this chapter and completing the exercises, you will be able to: Use Web tools.

The Art of Dumpster DivingDisks or hard drives containing company information

should be formatted with “disk-cleaning” software that writes binary 0s on all portions of the disks.

This formatting should be done at least seven times to ensure that all previous data is unreadable.

Old computer manuals should be discarded offsite so that dumpster divers can’t associate the manuals with the company.

Before disposal, all these items should be placed in a locked room with adequate physical, administrative, and technical safeguards.

All documents should be shredded, even if the information seems innocuous.

41

Page 42: Chapter 4 Foot printing and Social Engineering. Objectives After reading this chapter and completing the exercises, you will be able to: Use Web tools.

The Art of PiggybackingPiggybacking is trailing closely behind an

employee who has access to an area without the person realizing you didn’t use a PIN or a security badge to enter the area.

How it works:Watch authorized personnel enter an areaQuickly join them at security entranceExploit desire to be polite and helpfulAttacker wears a fake badge or security card

42

Page 43: Chapter 4 Foot printing and Social Engineering. Objectives After reading this chapter and completing the exercises, you will be able to: Use Web tools.

The Art of Piggybacking (cont’d.)Prevention

Use turnstiles (Barriers)Train personnel to notify security about

strangersDo not hold secured doors for anyone

Even people they knowAll employees must use access cards

Hands-On Ethical Hacking and Network Defense, Second Edition 43

Page 44: Chapter 4 Foot printing and Social Engineering. Objectives After reading this chapter and completing the exercises, you will be able to: Use Web tools.

PhishingAlmost everyone with an e-mail address has

received a phishing e-mail at some point.

“Update your account details” is a typical subject line.

The Web site is fake, but if you’re tricked intogiving out your personal account data.

Figure 4-12: One clue that the e-mail isn’t legitimate

is that the recipient is addressed by the generic “Dear PayPal Member” instead of his or her name.

Hands-On Ethical Hacking and Network Defense, Second Edition 44

Page 45: Chapter 4 Foot printing and Social Engineering. Objectives After reading this chapter and completing the exercises, you will be able to: Use Web tools.

Hands-On Ethical Hacking and Network Defense, Second Edition 45

Figure 4-12 A phishing e-mail

Page 46: Chapter 4 Foot printing and Social Engineering. Objectives After reading this chapter and completing the exercises, you will be able to: Use Web tools.

PhishingSpear phishing: Combines social engineering and

exploiting vulnerabilitiesThis attack is directed at specific people in an

organization and uses social engineering based on previous reconnaissance data to hook victims.

The goal is to entice victims into opening an attachment or clicking a link; this action installs the “spear phished” malware, which can have devastating effects on the network.

E-mail authentication technologies as well as security awareness training for users and constant vigilance help reduce the threat of phishing.

46

Page 47: Chapter 4 Foot printing and Social Engineering. Objectives After reading this chapter and completing the exercises, you will be able to: Use Web tools.

SummaryFootprinting

Gathering network information with Web toolsCompetitive intelligence

Gathered through observation and Web toolsIP addresses and domain names

Found by using tools (e.g., SamSpade)Cookies and Web bugs

Collect and retrieve user’s informationZone transfers

Used to obtain network topologies

Hands-On Ethical Hacking and Network Defense, Second Edition 47

Page 48: Chapter 4 Foot printing and Social Engineering. Objectives After reading this chapter and completing the exercises, you will be able to: Use Web tools.

Summary (cont’d.)Social engineering

Attacks using human nature Many methods

Educate personnelAttacker techniques

Shoulder surfingDumpster divingPiggybackingPhishing

Hands-On Ethical Hacking and Network Defense, Second Edition 48