KSI - Footprinting
-
Upload
lapha-emang-boo -
Category
Documents
-
view
230 -
download
0
Transcript of KSI - Footprinting
-
7/30/2019 KSI - Footprinting
1/16
Pertemuan 2
-
7/30/2019 KSI - Footprinting
2/16
Footprinting
Footprinting refers to uncovering andcollecting as much information as possibleabout a target
Attackers gathers valuable system-level
information such as account detail, operatingsystem, and other software version, servernames, and database schema detail Determine the Operating system used, platforms
running, webserver version, etc.
Find vulnerabilities and exploits for launching attacks Performed by techniques such us Whois, DNS,
network and organization queries
Collect basic information about the target and itsnetworks
-
7/30/2019 KSI - Footprinting
3/16
Objective of Footprinting
Collect Network Information
Domain name
Internal domain name
Network block IP address of the reachable system
TCP/UDP service running
Networking protocol
ACLs
IDSes running
Authentication mechanisms
-
7/30/2019 KSI - Footprinting
4/16
Objective of Footprinting
Collect System Information
User and group names
System banners
Routing tables
SNMP information
System architecture
Remote system type System name
Password
-
7/30/2019 KSI - Footprinting
5/16
Objective of Footprinting
Collect Organizations Information
Employee detail
Organizations website
Company directory
Address and phone numbers
Background on the organization
News articles/press realeases
-
7/30/2019 KSI - Footprinting
6/16
Footprinting Methodology
Internet Footprinting Finding a companys URL
Locate Internal URLs
Public and Restricted Website
Search for Companys Information
Tools Extract Companys Data http://webextractor.com
http://binarypool.com
http://robtex.com
Collect location information (google maps)
People search
People search online service
People search on Social Networking Service
Gather information from financial service
Footprinting Through Job Site
Google alert
http://webextractor.com/http://binarypool.com/http://robtex.com/http://robtex.com/http://binarypool.com/http://webextractor.com/ -
7/30/2019 KSI - Footprinting
7/16
Footprinting Methodology
Competitive Intelligence
When did this company begin?
How did it develop?
What are the companys plans?
Competitive intelligence tools
http://secinfo.com
http://home.businesswire.com http://web-investigator.net
http://forbes.com
http://secinfo.com/http://home.businesswire.com/http://web-investigator.net/http://forbes.com/http://forbes.com/http://web-investigator.net/http://web-investigator.net/http://web-investigator.net/http://home.businesswire.com/http://secinfo.com/ -
7/30/2019 KSI - Footprinting
8/16
Footprinting Methodology
WHOIS Footprinting WHOIS query returns
Domain name detail Contact detail of domain owner Domain name server
Netrange
Regional Internet Registry
AfriNIC ARIN APNIC
LACNIC, RIPE NCC
WHOIS lookup tools http://tamos.com
http://whois.net http://iptools.com
SmartWhois Attacerks look for
Physical location
Telephone number
Email address Techincal and administrative contact
http://tamos.com/http://whois.net/http://iptools.com/http://iptools.com/http://whois.net/http://tamos.com/ -
7/30/2019 KSI - Footprinting
9/16
Footprinting Methodology
DNS Footprinting
DNS records provide important information
about location and type of server
DNS integration tools http://dnsstuff.com
http://checkdns.net
http://iptools.com
http://dnsstuff.com/http://checkdns.net/http://iptools.com/http://iptools.com/http://checkdns.net/http://dnsstuff.com/ -
7/30/2019 KSI - Footprinting
10/16
Footprinting Methodology
Network Footprinting
Locate the network range (whois)
Traceroute (check hop and destination)
Traceroute tools
3D traceroute
LoriotPro
Path Analyzer Pro
http://lg.mohonmaaf.com
http://pwhois.org
http://lg.mohonmaaf.com/http://pwhois.org/http://pwhois.org/http://lg.mohonmaaf.com/ -
7/30/2019 KSI - Footprinting
11/16
Footprinting Methodology
Website Footprinting
Mirroring Entire Website
http://httrack.com
http://surfoffline.com http://pagenest.com
Website Archive
http://archive.org
Monitoring Web Update Wabsite watcher
Goolgle alert
http://httrack.com/http://surfoffline.com/http://pagenest.com/http://archive.org/http://archive.org/http://pagenest.com/http://surfoffline.com/http://httrack.com/ -
7/30/2019 KSI - Footprinting
12/16
Footprinting Methodology
Email Footprinting Tracking Email Communication
Email tracking is a method to monitor and spy thedelivered e-mail to the intended recipient
When the email was receive and read Send destructive emails
GPS location and map of the recipient
Time spent on reading the emails
Whether or not the recipient visited any link sent tothem
Track PDF and other type of attachments Set messages to expire after a specified time
Email Tracking Tools http://emailtrackerpro.com
http://didtheyreadit.com
http://emailtrackerpro.com/http://didtheyreadit.com/http://didtheyreadit.com/http://emailtrackerpro.com/ -
7/30/2019 KSI - Footprinting
13/16
Footprinting Methodology
Google Hacking Footprinting using google hacking techniques
Query string
Vulnerable site
Google operators What a hacker can do with google hacking?
Error messages that contain sensitive information
File containing passwords
Sensitive directories
Page containing logon portals Page containing network or vulnerability data
Advisors and server vulnerabelities
-
7/30/2019 KSI - Footprinting
14/16
Footprinting Methodology
Google Hacking
Google advance search operators
[cache:], [link:], [related:], [info:], [site:],
[allintitle:], [intitle:], [allinurl:], [inurl:] Google hacking tools (GHDB)
http://code.google.com
http://www.exploit-db.com/google-dorks/
http://code.google.com/http://www.exploit-db.com/google-dorks/http://www.exploit-db.com/google-dorks/http://www.exploit-db.com/google-dorks/http://www.exploit-db.com/google-dorks/http://www.exploit-db.com/google-dorks/http://www.exploit-db.com/google-dorks/http://www.exploit-db.com/google-dorks/http://code.google.com/ -
7/30/2019 KSI - Footprinting
15/16
Footprinting Pen Testing
Pertemuan berikutnya
-
7/30/2019 KSI - Footprinting
16/16
TERIMA KASIH