KSI - Footprinting

download KSI - Footprinting

of 16

Transcript of KSI - Footprinting

  • 7/30/2019 KSI - Footprinting

    1/16

    Pertemuan 2

  • 7/30/2019 KSI - Footprinting

    2/16

    Footprinting

    Footprinting refers to uncovering andcollecting as much information as possibleabout a target

    Attackers gathers valuable system-level

    information such as account detail, operatingsystem, and other software version, servernames, and database schema detail Determine the Operating system used, platforms

    running, webserver version, etc.

    Find vulnerabilities and exploits for launching attacks Performed by techniques such us Whois, DNS,

    network and organization queries

    Collect basic information about the target and itsnetworks

  • 7/30/2019 KSI - Footprinting

    3/16

    Objective of Footprinting

    Collect Network Information

    Domain name

    Internal domain name

    Network block IP address of the reachable system

    TCP/UDP service running

    Networking protocol

    ACLs

    IDSes running

    Authentication mechanisms

  • 7/30/2019 KSI - Footprinting

    4/16

    Objective of Footprinting

    Collect System Information

    User and group names

    System banners

    Routing tables

    SNMP information

    System architecture

    Remote system type System name

    Password

  • 7/30/2019 KSI - Footprinting

    5/16

    Objective of Footprinting

    Collect Organizations Information

    Employee detail

    Organizations website

    Company directory

    Address and phone numbers

    Background on the organization

    News articles/press realeases

  • 7/30/2019 KSI - Footprinting

    6/16

    Footprinting Methodology

    Internet Footprinting Finding a companys URL

    Locate Internal URLs

    Public and Restricted Website

    Search for Companys Information

    Tools Extract Companys Data http://webextractor.com

    http://binarypool.com

    http://robtex.com

    Collect location information (google maps)

    People search

    People search online service

    People search on Social Networking Service

    Gather information from financial service

    Footprinting Through Job Site

    Google alert

    http://webextractor.com/http://binarypool.com/http://robtex.com/http://robtex.com/http://binarypool.com/http://webextractor.com/
  • 7/30/2019 KSI - Footprinting

    7/16

    Footprinting Methodology

    Competitive Intelligence

    When did this company begin?

    How did it develop?

    What are the companys plans?

    Competitive intelligence tools

    http://secinfo.com

    http://home.businesswire.com http://web-investigator.net

    http://forbes.com

    http://secinfo.com/http://home.businesswire.com/http://web-investigator.net/http://forbes.com/http://forbes.com/http://web-investigator.net/http://web-investigator.net/http://web-investigator.net/http://home.businesswire.com/http://secinfo.com/
  • 7/30/2019 KSI - Footprinting

    8/16

    Footprinting Methodology

    WHOIS Footprinting WHOIS query returns

    Domain name detail Contact detail of domain owner Domain name server

    Netrange

    Regional Internet Registry

    AfriNIC ARIN APNIC

    LACNIC, RIPE NCC

    WHOIS lookup tools http://tamos.com

    http://whois.net http://iptools.com

    SmartWhois Attacerks look for

    Physical location

    Telephone number

    Email address Techincal and administrative contact

    http://tamos.com/http://whois.net/http://iptools.com/http://iptools.com/http://whois.net/http://tamos.com/
  • 7/30/2019 KSI - Footprinting

    9/16

    Footprinting Methodology

    DNS Footprinting

    DNS records provide important information

    about location and type of server

    DNS integration tools http://dnsstuff.com

    http://checkdns.net

    http://iptools.com

    http://dnsstuff.com/http://checkdns.net/http://iptools.com/http://iptools.com/http://checkdns.net/http://dnsstuff.com/
  • 7/30/2019 KSI - Footprinting

    10/16

    Footprinting Methodology

    Network Footprinting

    Locate the network range (whois)

    Traceroute (check hop and destination)

    Traceroute tools

    3D traceroute

    LoriotPro

    Path Analyzer Pro

    http://lg.mohonmaaf.com

    http://pwhois.org

    http://lg.mohonmaaf.com/http://pwhois.org/http://pwhois.org/http://lg.mohonmaaf.com/
  • 7/30/2019 KSI - Footprinting

    11/16

    Footprinting Methodology

    Website Footprinting

    Mirroring Entire Website

    http://httrack.com

    http://surfoffline.com http://pagenest.com

    Website Archive

    http://archive.org

    Monitoring Web Update Wabsite watcher

    Goolgle alert

    http://httrack.com/http://surfoffline.com/http://pagenest.com/http://archive.org/http://archive.org/http://pagenest.com/http://surfoffline.com/http://httrack.com/
  • 7/30/2019 KSI - Footprinting

    12/16

    Footprinting Methodology

    Email Footprinting Tracking Email Communication

    Email tracking is a method to monitor and spy thedelivered e-mail to the intended recipient

    When the email was receive and read Send destructive emails

    GPS location and map of the recipient

    Time spent on reading the emails

    Whether or not the recipient visited any link sent tothem

    Track PDF and other type of attachments Set messages to expire after a specified time

    Email Tracking Tools http://emailtrackerpro.com

    http://didtheyreadit.com

    http://emailtrackerpro.com/http://didtheyreadit.com/http://didtheyreadit.com/http://emailtrackerpro.com/
  • 7/30/2019 KSI - Footprinting

    13/16

    Footprinting Methodology

    Google Hacking Footprinting using google hacking techniques

    Query string

    Vulnerable site

    Google operators What a hacker can do with google hacking?

    Error messages that contain sensitive information

    File containing passwords

    Sensitive directories

    Page containing logon portals Page containing network or vulnerability data

    Advisors and server vulnerabelities

  • 7/30/2019 KSI - Footprinting

    14/16

    Footprinting Methodology

    Google Hacking

    Google advance search operators

    [cache:], [link:], [related:], [info:], [site:],

    [allintitle:], [intitle:], [allinurl:], [inurl:] Google hacking tools (GHDB)

    http://code.google.com

    http://www.exploit-db.com/google-dorks/

    http://code.google.com/http://www.exploit-db.com/google-dorks/http://www.exploit-db.com/google-dorks/http://www.exploit-db.com/google-dorks/http://www.exploit-db.com/google-dorks/http://www.exploit-db.com/google-dorks/http://www.exploit-db.com/google-dorks/http://www.exploit-db.com/google-dorks/http://code.google.com/
  • 7/30/2019 KSI - Footprinting

    15/16

    Footprinting Pen Testing

    Pertemuan berikutnya

  • 7/30/2019 KSI - Footprinting

    16/16

    TERIMA KASIH