Footprinting mzl

36
IT Security & Ethical Hacking “FOOTPRINTING” BY Er. Mujmmil Shaikh

description

Footprinting is the blueprint of the security profile of an organization, undertaken in a methodological manner.

Transcript of Footprinting mzl

Page 1: Footprinting  mzl

IT Security & Ethical Hacking

“FOOTPRINTING”

BY

Er. Mujmmil Shaikh

Page 2: Footprinting  mzl

Appin Tech 2011

ER.MUJMMIL SHAIKH

Table of Content

1. Introduction. 2. Why Footprinting Necessary? 3. Areas & Information which attackers seek. 4. Information Gathering Methodology. 5. Competitive Intelligence Gathering. 6. Footprinting Tools. 7. Who is Tools? 8. DNS Information Extraction Tools. 9. Locating Network Range. 10. E-mail Spiders. 11. Locating Network Activity. 12. Search Engines. 13. How to Fake Websites? 14. Summary.

Page 3: Footprinting  mzl

Appin Tech 2011

ER.MUJMMIL SHAIKH

Introduction

Footprinting is the blueprint of the security profile

of an organization, undertaken in a methodological manner.

Footprinting is one of

the three pre attack phases; an attacker spends 90% of the

time in profiling an organization and another 10% in

launching the attack.

Footprinting results in a unique organization profile

with respect to Networks (Internet/intranet/extranet/wireless)

and systems involved.

Why Footprinting Necessary?

Footprinting is necessary to systematically and methodically

Ensure that all pieces of information related to the aforementioned

technologies are identified.

Footprinting is often the most difficult task to

determine the security posture of an entity.

Page 4: Footprinting  mzl

Appin Tech 2011

ER.MUJMMIL SHAIKH

Areas and information which attackers seek

INFORMATION GATHERING

1. Information Gathering Methodology

Unearth initial information.

Locate the network range.

Ascertain active machines.

Discover open ports/access points.

Detect operating systems.

Uncover services on ports.

Map the network.

Page 5: Footprinting  mzl

Appin Tech 2011

ER.MUJMMIL SHAIKH

2. Passive Information Gathering

Passive Information Gathering means

To understand the current security status of a particular

information system, organizations perform either a penetration

testing or other hacking techniques.

It is done by finding out

the freely available details over the internet and by various other

techniques without coming in contact with the organizations

servers.

Organizational and other informative websites are

exceptions as the information gathering activities carried out by an

attacker do not raise suspicion.

COMPETITIVE INTELLIGENCE GATHERING

Business moves fast. Product cycles are measured in

months, not years. Partners become rivals quicker than you can say

„breach of contract.‟ So how can you possibly hope to keep up

with your competitors if you can‟t keep an eye on them?

It is the process

of gathering information about your competitors from resources

such as the internet. The competitive intelligence is non-interfering

and subtle in nature. It is both a product and a process.

Page 6: Footprinting  mzl

Appin Tech 2011

ER.MUJMMIL SHAIKH

Why do you need competitive intelligence?

Page 7: Footprinting  mzl

Appin Tech 2011

ER.MUJMMIL SHAIKH

Competitive intelligence tool:

1. Trellian

Trellian compiles and analyzes internet usage statistics

to create a powerful competitive intelligence tool that no business

should be without

Page 8: Footprinting  mzl

Appin Tech 2011

ER.MUJMMIL SHAIKH

2. Web Investigator

Screenshot:-

Page 9: Footprinting  mzl

Appin Tech 2011

ER.MUJMMIL SHAIKH

3. Relevant Noise.

Screenshot:-

Page 10: Footprinting  mzl

Appin Tech 2011

ER.MUJMMIL SHAIKH

4. Reputica Dashboard.

Screenshot:-

Page 11: Footprinting  mzl

Appin Tech 2011

ER.MUJMMIL SHAIKH

5. My Reputation.

My Reputation finds out everything that is being said

about you online and gets rid of the content you do not like.

Public & private websites

Page 12: Footprinting  mzl

Appin Tech 2011

ER.MUJMMIL SHAIKH

FOOTPRINTING TOOLS

1. Big Brother

Big brother is designed to see how network is

performing in near real-time from any web browser. It

displays status information as web pages or

WML pages for WAP-enabled devices.

Big brother uses a client-server

architecture combined with methods which push and pull

data. Network testing is done by polling all monitored

services from a single machine, and reporting these results

to a central location (BBDISPLAY).

Big brother include support for

testing ftp,http,https,smtp,pop3,dns,telnet,imap,nntp and ssh

servers.

Screenshot:-

Page 13: Footprinting  mzl

Appin Tech 2011

ER.MUJMMIL SHAIKH

2. Bile Suite

3. Alchemy Network Tool.

Page 14: Footprinting  mzl

Appin Tech 2011

ER.MUJMMIL SHAIKH

4. Advanced Administrative Tool (AA)

5. My IP Suite

Page 15: Footprinting  mzl

Appin Tech 2011

ER.MUJMMIL SHAIKH

WHOIS TOOLS

1. Active whois.

Screenshot:-

Page 16: Footprinting  mzl

Appin Tech 2011

ER.MUJMMIL SHAIKH

2. LAN Whois.

Screenshot:-

Page 17: Footprinting  mzl

Appin Tech 2011

ER.MUJMMIL SHAIKH

3. Country Whois.

Screenshot:-

Page 18: Footprinting  mzl

Appin Tech 2011

ER.MUJMMIL SHAIKH

4. Whereisip.

Screenshot:-

Page 19: Footprinting  mzl

Appin Tech 2011

ER.MUJMMIL SHAIKH

5. IP2country.

Screenshot:-

Page 20: Footprinting  mzl

Appin Tech 2011

ER.MUJMMIL SHAIKH

6. Caller IP.

Screenshot:-

Page 21: Footprinting  mzl

Appin Tech 2011

ER.MUJMMIL SHAIKH

7. Web Data Extractor Tool.

8. Online Whois Tools.

Page 22: Footprinting  mzl

Appin Tech 2011

ER.MUJMMIL SHAIKH

DNS INFORMATION EXTRACTION TOOLS

1. Spider Foot.

Spider foot is a free, open-source, and domain

foot printing tool which will scrape the websites on that

domain, as well as search Google, Netcraft, Whois, and

DNS to build up information like:

Sub domains.

Affiliates.

Web server versions.

Users.

Similar Domains.

Email Addresses.

Net blocks.

Screenshot:-

Page 23: Footprinting  mzl

Appin Tech 2011

ER.MUJMMIL SHAIKH

2. Nslookup.

Screenshot:-

Page 24: Footprinting  mzl

Appin Tech 2011

ER.MUJMMIL SHAIKH

3. Expired Domains.

Screenshot:-

Page 25: Footprinting  mzl

Appin Tech 2011

ER.MUJMMIL SHAIKH

4. Domain king.

Screenshot:-

Page 26: Footprinting  mzl

Appin Tech 2011

ER.MUJMMIL SHAIKH

5. Domain Name Analyzer.

Screenshot:-

Page 27: Footprinting  mzl

Appin Tech 2011

ER.MUJMMIL SHAIKH

6. Domain Inspect.

Screenshot:-

Page 28: Footprinting  mzl

Appin Tech 2011

ER.MUJMMIL SHAIKH

LOCATING NETWORK RANGE

1. Commonly includes:

Finding the range of IP addresses.

Discerning the subnet mask.

2. Information Sources:

ARIN (American registry of internet

Numbers).

Trace route.

3. Hacking Tool:

NeoTrace.

Visual Route.

ARIN

Arin allows searches on the whois database to locate

information on a network‟s autonomous system numbers

(ASNs), network-related handles, and other related point of

contact (POC).

ARIN whois allows querying the IP

address to find information on the strategy used for subnet

Addressing.

Page 29: Footprinting  mzl

Appin Tech 2011

ER.MUJMMIL SHAIKH

Trace route Trace route works by exploiting a feature of the internet

protocol called TTL or Time to Live.

Trace route reveals the path IP packets travel between

two systems by sending out consecutive sets

Of UDP or ICMP packets with ever increasing TTLs.

As each router processes an IP packet, it

decrements the TTL, when the TTL reaches zero, that router sends back a

“TTL exceeded” message (Using ICMP) to the originator. Routers with

reverse DNS entries may reveal the name of routers, network affiliation, and

geographic location.

Screenshot:-

Page 30: Footprinting  mzl

Appin Tech 2011

ER.MUJMMIL SHAIKH

Trace Route Analysis

It is a program that can be used to determine the path

from source to destination. By using this information, an attacker

determines the layout of a network and the location of each device.

For example: after running several trace routes, an attacker

might obtain the following information.

Trace route 1.10.10.20, second to last hop is 1.10.10.1.

Trace route 1.10.20.10, third to last hop is 1.10.10.1.

Trace route 1.10.20.10, second to last hop is 1.10.10.50.

Trace route 1.10.20.15, third to last hop is 1.10.10.1.

Trace route 1.10.20.15, second to last hop is 1.10.10.50.

Page 31: Footprinting  mzl

Appin Tech 2011

ER.MUJMMIL SHAIKH

E-MAIL SPIDERS

Have you ever wondered how spammers generate a huge

mailing database? They pick tons of e-mail addresses by searching

in the internet. All they need is a web spidering tool picking up e-

mail addresses and storing them to a database. If these tools run the

entire night, they can capture hundreds of thousands of e-mail

addresses.

Power E-mail Collector Tool

o It is a powerful email address harvesting program.

o It can collect up to 750,000 unique valid email

addresses per hour with a cable/Dsl.

o It only collects valid email addresses.

o You do not have to worry about ending up with

undeliverable addresses.

Page 32: Footprinting  mzl

Appin Tech 2011

ER.MUJMMIL SHAIKH

LOCATING NETWORK ACTIVITY

1. GEO Spider Tool

GEO spider helps you to detect, identify, and monitor

your network activity on the world map. You can see

website‟s IP address location on the earth. Geo spider

can trace a domain name.

Page 33: Footprinting  mzl

Appin Tech 2011

ER.MUJMMIL SHAIKH

2. Geo where tool.

Geo where handles many popular news groups to find answers to your

queries in an easy and fast manner. it can also seek information from

country specific search engines for better results.

Use Geo where to footprint an organizations:

News groups search

Mailing list finder

Easy web search

Daily news

Page 34: Footprinting  mzl

Appin Tech 2011

ER.MUJMMIL SHAIKH

SEARCH ENGINES

A web search engine is designed to search for information on the World

Wide Web and FTP servers. The search results are generally presented in a list of

results and are often called hits. The information may consist of web pages,

images, information and other types of files.

Some search engines also mine data available in databases or open

directories. Unlike Web directories, which are maintained by human editors, search

engines operate algorithmically or are a mixture of algorithmic and human input. A

new type of search engine has recently been launched where an individual can own

keywords and profit from that relationship.

1. Kartoo Search Engine.

2. Dogpile Search Engine.

Search Engine List

1. 20SEARCH 2. ALL THE WEB 3. ALTA VISTA 4. AOL SEARCH 5. ASK JEEVES 6. DOGPILE 7. EBAY 8. EXCITE 9. GIGABLAST 10. GOOGLE 11. IWON 12. JOEANT 13. LYCOS 14. MAMMA 15. MSN 16. NETSCAPE 17. OPEN DIRECTORY 18. WEBCRAWLER 19. WIKIPEDIA 20. YAHOO

Page 35: Footprinting  mzl

Appin Tech 2011

ER.MUJMMIL SHAIKH

How to fake websites?

Website spoofing

Website spoofing is the act of creating a website, as a hoax, with the

intention of misleading readers that the website has been created by a different

person or organization. Another meaning for spoof is fake websites. Normally, the

website will adopt the design of the target website and sometimes has a similar

URL.

Another technique is to use a 'cloaked' URL. By using domain forwarding,

or inserting control characters, the URL can appear to be genuine while concealing

the address of the actual website. The objective may be fraudulent, often associated

with phishing or e-mail spoofing, or to criticize or make fun of the person or body

whose website the spoofed site purports to represent.

Steps to create fake login pages:

1. Open any form building website (www.xyz.com) & sign up.

2. Login with newly registered account.

3. Click > create first form.

4. Delete all pre-defined entries and just leave „first name‟.

5. Click > first name & click > power tool option.

6. Double click > password Box.

7. Click the newly form password entry to rename it as „password‟.

8. Click > properties option.

9. Give any title to the form.

10. Put any link.

11. Open source code option.

12. Code is save “.html” Format.

13. Using free hosting website upload file.

Page 36: Footprinting  mzl

Appin Tech 2011

ER.MUJMMIL SHAIKH

Summary: