Footprinting and Reconnaissance
Hello Peeps!!!
Today I’m going to talk about the Footprinting and Reconnaissance
Footprinting known as Reconnaissance, it is most important part
in the hacking. Reconnaissance is the first step before an attack on a network,
application or a system.
What Footprinting is?
Footprinting is the process of collecting information as
possible about a target network or a system, for identifying various ways to
intrude into an organization’s network system. In here gathers all publically
available sensitive data, using several types of tools and methodologies.
Footprinting allows attackers to know the external security posture
and flaw of the target organization. It reduces attacker’s focus area to
specific range of IP address, networks, domain names and etc. It allows attacker to identify the vulnerabilities
and understand the outline the target organization’s network infrastructure.
Objectives of Footprinting
Collect network information (Domain name, IP address,
Private Websites, VPN points, Authentication mechanisms, Network Protocols)
Collect system Information (Users and group names, System
banners, Routing tables, Passwords, Remote system types)
Collect Organizations information (Employee details,
Organizations web site, security policies, Background of the organization.)
How can we do the Footprinting?
Footprinting through Search Engines
Search engines are the attackers used to extract information
about target system or organization such as technology platforms, employee
details, login pages and etc.
Search engines are Google, Yahoo, Bing and etc. Using
the several tools we can identify the Operating system in the Organization such
as Netcraft, SHODAN and etc.
Google Earth, Google maps, Bing maps, Social networking
sites (Facebook, Twitter), Any Who, People Smart, Private Eye, Veromi, US
Search application and web site can use identify location and people
information.
Google Finance and Yahoo finance gives market value of
organizations shares, company profile, competitor details and etc.
We can
gather company’s infrastructure details from job posting and information
gathering using Groups, Forum, and Blogs.
Footprinting using advanced Google hacking techniques
Complex query strings are extract sensitive or hidden
information and it helps to find the vulnerable targets. It uses advanced
Google search operators to locate specific string of text within search
results. (link, info, site, inurl, cache and etc.)
Most valuable data base is Google hacking Database. It’s
provides lot of searching techniques to gather the information.
Website Footprinting
It refers to monitoring and analyzing the target
organization’s web site for information. We can use Wireshark and Burp Suite tools
to capture the traffic. Web spiders perform automated searches on the target
website and collect specified information such as employee names, emails and
etc. (GSA Email spider, Web Data extractor)
We can download the attacking website and it also assists
finding directory structure and other valuable information from the mirrored copy
without requests to original web server.
Tools are HTTrack, SurfOffline, Black widow, PageNest, Website Ripper
Copier, GNU Wget and etc.
Email Footprinting
We can use lot of tools to gather information from Emails
then we need to use some email tracking tools. They are Yesware, Zendio,
Contact Monkey, Pointofmail, WhoReadMe and etc.
Competitive Intelligence
Competitive Intelligence gathering is the process of
identifying, gathering, analyzing, verifying and using information. In here
check the when did company begins, how did they developed, what are the organizations
plans.
Whois, DNS and Network Footprinting also can be done. To
gather the Information Eavesdropping, Shoulder Surfing and Dumpster diving methods
also use. I will explain about these
terms in using other blog post.
Footprinting Tools
Maltego,
Recon-ng, FOCA, TcTrace, Netmask, Binging, DNS –Digger, TinEye, Robtex, MetaGoofil,Wikto
How to prevent the Footprinting?
- Restrict the employees to access social networking sites from organization’s network.
- Configure the web servers to mitigate information leakage.
- Need to educate the employees in the company about Social engineering attacks and risks.
- Do not reveal critical data to any papers, annual reports or product catalogs.
- Use footprint techniques to discover and remove any sensitive data in the organization.
- Every stored data must be encrypted and all communication must be going through the HTTPS protocol.
- Enforce the Security Policies and distributes to an employee.
- Disable the directory listings in the web servers.
References :
[1]https://www.hackingloops.com/hacking-class-2-footprinting-and-how-it-can-be-helpful-to-hack-systems/
[2]https://mywebclasses.wordpress.com/category/ceh/ceh-02-footprinting-and-reconnaissance/
[3]https://www.sans.org/reading-room/whitepapers/auditing/footprinting-it-it-why-62
This all about the Footprinting. I will bring some interesting topic to next time.
Keep In Touch !!!
S!N3TH
Comments
Post a Comment