Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last...

63
Hands-On Ethical Hands-On Ethical Hacking and Network Hacking and Network Defense Defense Chapter 4 Chapter 4 Footprinting and Social Engineering Footprinting and Social Engineering Last modified 9-8-10

description

Using Web Tools for Footprinting “Case the joint” “Case the joint” Look over the locationLook over the location Find weakness in security systemsFind weakness in security systems Types of locks, alarmsTypes of locks, alarms In computer jargon, this is called footprinting In computer jargon, this is called footprinting Discover information aboutDiscover information about The organization The organization Its network Its network

Transcript of Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last...

Page 1: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.

Hands-On Ethical Hands-On Ethical Hacking and Network Hacking and Network

DefenseDefense

Chapter 4Chapter 4Footprinting and Social EngineeringFootprinting and Social Engineering

Last modified 9-8-10

Page 2: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.

ObjectivesObjectives

Use Web tools for footprintingUse Web tools for footprinting Conduct competitive intelligenceConduct competitive intelligence Describe DNS zone transfersDescribe DNS zone transfers Identify the types of social Identify the types of social

engineeringengineering

Page 3: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.

Using Web Tools for Using Web Tools for FootprintingFootprinting

““Case the joint”Case the joint”• Look over the locationLook over the location• Find weakness in security systemsFind weakness in security systems• Types of locks, alarmsTypes of locks, alarms

In computer jargon, this is called In computer jargon, this is called footprintingfootprinting• Discover information about Discover information about

The organizationThe organization Its networkIts network

Page 4: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.

Table 4-1 Summary of Web tools

Page 5: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.

Rafasoft.comRafasoft.com

Page 6: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.

Table 4-1 Summary of Web tools (cont’d.)

Page 7: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.

Conducting Competitive Conducting Competitive IntelligenceIntelligence

Numerous resources to find Numerous resources to find information legallyinformation legally

Competitive IntelligenceCompetitive Intelligence• Gathering information using technologyGathering information using technology

Identify methods others can use to find Identify methods others can use to find information about your organizationinformation about your organization

Limit amount of information company Limit amount of information company makes publicmakes public

Page 8: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.

Analyzing a Company’s Web Analyzing a Company’s Web SiteSite

Web pages are an easy source of Web pages are an easy source of informationinformation

Many tools availableMany tools available ParosParos

• Powerful tool for UNIX and WindowsPowerful tool for UNIX and Windows• www.parosproxy.orgwww.parosproxy.org• Requires Java Requires Java

www.sun.comwww.sun.com

Page 9: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.

Setting a Proxy Server in FirefoxSetting a Proxy Server in Firefox

• ToolsTools• OptionsOptions• AdvancedAdvanced• SettingsSettings

Page 10: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.

Basic Proxy UseBasic Proxy Use

Shows Shows each each request request and and responseresponse

Page 11: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.

Spider ResultsSpider Results In Paros:In Paros:

• AnalyzeAnalyze• SpiderSpider

Finds all the pages Finds all the pages in a sitein a site

Page 12: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.

Scan ResultsScan Results

In Paros:In Paros:• AnalyzeAnalyze• ScanScan

Finds security Finds security risks in a siterisks in a site

Page 13: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.

Other ProxiesOther Proxies WebScarab from OWASPWebScarab from OWASP

• Very powerful, used for WebGoat Very powerful, used for WebGoat application security training application security training

• Link Ch 4iLink Ch 4i Tamper DataTamper Data

• Firefox plug-in for easy interception and Firefox plug-in for easy interception and alteration of requestsalteration of requests

Page 14: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.

Using Other Footprinting ToolsUsing Other Footprinting Tools

WhoisWhois• Commonly used toolCommonly used tool• Gathers IP address and domain Gathers IP address and domain

informationinformation• Attackers can also use itAttackers can also use it

Host commandHost command• Can look up one IP address, or the whole Can look up one IP address, or the whole

DNS Zone fileDNS Zone file All the servers in the domainAll the servers in the domain

Page 15: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.

ARIN Whois ARIN Whois from Linuxfrom Linux

host mit.eduhost mit.edu nc whois.arin.netnc whois.arin.net 18.7.22.6918.7.22.69

This shows This shows registration registration information for the information for the domaindomain

Page 16: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.

Sam SpadeSam Spade

GUI toolGUI tool Available Available

for UNIX for UNIX and and WindowsWindows

Easy to useEasy to use

Page 17: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.

Using E-mail AddressesUsing E-mail Addresses

E-mail addresses help you retrieve E-mail addresses help you retrieve even more information than the even more information than the previous commandsprevious commands

Find e-mail address formatFind e-mail address format• Guess other employees’ e-mail accountsGuess other employees’ e-mail accounts

Tool to find corporate employee Tool to find corporate employee informationinformation• Groups.google.comGroups.google.com

Page 18: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.

Using HTTP BasicsUsing HTTP Basics

HTTP operates on port 80HTTP operates on port 80 Use HTTP language to pull Use HTTP language to pull

information from a Web serverinformation from a Web server Basic understanding of HTTP is Basic understanding of HTTP is

beneficial for security testersbeneficial for security testers Return codesReturn codes

• Reveal information about server OSReveal information about server OS

Page 19: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.
Page 20: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.
Page 21: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.

Using HTTP Basics (continued)Using HTTP Basics (continued)

HTTP methodsHTTP methods• GET / HTTP/1.1. is the most basic GET / HTTP/1.1. is the most basic

methodmethod• Can determine information about server Can determine information about server

OS from the server’s generated output OS from the server’s generated output

Page 22: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.
Page 23: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.

Using Telnet as a BrowserUsing Telnet as a Browser

Use WindowsUse Windows• If Telnet is not installed, use Control If Telnet is not installed, use Control

Panel, Programs and Features, Panel, Programs and Features, Add/Remove Windows ComponentsAdd/Remove Windows Components

telnet samsclass.info 80telnet samsclass.info 80 Press Ctrl+]Press Ctrl+] Set localechoSet localecho Press Enter twicePress Enter twice

Page 24: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.

Using the OPTIONS MethodUsing the OPTIONS Method

Page 25: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.

Using the GET MethodUsing the GET Method

Page 26: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.

iClicker Questions

Page 27: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.

A. Spider

B. Proxy

C. Whois

D. GET

E. HEAD

Which technique automatically retrieves every page from an entire Web site?

Page 28: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.

A. OPTIONS

B. Proxy

C. Whois

D. GET

E. HEAD

Which technique is used by a browser to view a Web page?

Page 29: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.

A. OPTIONS

B. Proxy

C. Whois

D. PUT

E. HEAD

Which technique tells you contact information for the owner of a Web site?

Page 30: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.

A. PUT

B. Proxy

C. Telnet

D. GET

E. HEAD

Which technique lets you type in HTTP requests manually?

Page 31: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.

Other Methods of Gathering Other Methods of Gathering InformationInformation

CookiesCookies Web bugsWeb bugs

Page 32: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.

Detecting Cookies and Web Detecting Cookies and Web BugsBugs

CookieCookie• Text file generated by a Web serverText file generated by a Web server• Stored on a user’s browserStored on a user’s browser• Information sent back to Web server Information sent back to Web server

when user returnswhen user returns• Used to customize Web pagesUsed to customize Web pages• Some cookies store personal informationSome cookies store personal information

Security issueSecurity issue

Page 33: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.

Viewing CookiesViewing Cookies In FirefoxIn Firefox Tools, Options Tools, Options Privacy tabPrivacy tab Show CookiesShow Cookies

Page 34: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.

Detecting Cookies and Web Detecting Cookies and Web Bugs (continued)Bugs (continued)

Web bugWeb bug• 1-pixel x 1-pixel image file (usually 1-pixel x 1-pixel image file (usually

transparent)transparent)• Referenced in an <IMG> tagReferenced in an <IMG> tag• Usually works with a cookieUsually works with a cookie• Purpose similar to that of spyware and Purpose similar to that of spyware and

adwareadware• Comes from third-party companies Comes from third-party companies

specializing in data collectionspecializing in data collection

Page 35: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.

GhosteryGhostery

Firefox extension to reveal Web bugsFirefox extension to reveal Web bugs Count of trackers appears in status barCount of trackers appears in status bar

• Link Ch 4jLink Ch 4j

Page 36: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.

Using Domain Name Service Using Domain Name Service (DNS) Zone Transfers(DNS) Zone Transfers

DNSDNS• Resolves host names to IP addressesResolves host names to IP addresses• People prefer using URLs to IP addressesPeople prefer using URLs to IP addresses

Zone Transfer toolsZone Transfer tools• DigDig• HostHost

Page 37: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.

Primary DNS ServerPrimary DNS Server Determining company’s primary DNS Determining company’s primary DNS

serverserver• Look for the Start of Authority (SOA) Look for the Start of Authority (SOA)

recordrecord• Shows zones or IP addressesShows zones or IP addresses

Page 38: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.

Using dig to find the SOAUsing dig to find the SOA dig soa mit.edudig soa mit.edu Shows three Shows three

servers, with IP servers, with IP addressesaddresses

This is a start at This is a start at mapping the MIT mapping the MIT networknetwork

Page 39: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.

Using (DNS) Zone TransfersUsing (DNS) Zone Transfers Zone TransferZone Transfer

• Enables you to see all hosts on a Enables you to see all hosts on a networknetwork

• Gives you organization’s network Gives you organization’s network diagramdiagram

MIT has protected their network – zone MIT has protected their network – zone transfers no longer worktransfers no longer work

dig @BITSY.mit.edu mit.edu axfrdig @BITSY.mit.edu mit.edu axfr Command fails nowCommand fails now

Page 40: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.

Blocking Zone TransfersBlocking Zone Transfers

• See link Ch 4eSee link Ch 4e

Page 41: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.

Introduction to Social Introduction to Social EngineeringEngineering

Older than computersOlder than computers Targets the human component of a Targets the human component of a

networknetwork GoalsGoals

• Obtain confidential information Obtain confidential information (passwords)(passwords)

• Obtain personal informationObtain personal information

Page 42: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.

TacticsTactics

• PersuasionPersuasion• IntimidationIntimidation• CoercionCoercion• Extortion/blackmailingExtortion/blackmailing

Page 43: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.

Introduction to Social Introduction to Social Engineering (continued)Engineering (continued)

The biggest security threat to The biggest security threat to networksnetworks

Most difficult to protect againstMost difficult to protect against Main idea:Main idea:

• ““Why to crack a password when you can Why to crack a password when you can simply ask for it?”simply ask for it?”

• Users divulge their passwords to IT Users divulge their passwords to IT personnelpersonnel

Page 44: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.

Social Engineer Studies Human Social Engineer Studies Human BehaviorBehavior

• Recognize personality traitsRecognize personality traits• Understand how to read body languageUnderstand how to read body language

Page 45: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.

Introduction to Social Introduction to Social Engineering (continued)Engineering (continued)

TechniquesTechniques• UrgencyUrgency• Quid pro quoQuid pro quo• Status quoStatus quo• KindnessKindness• PositionPosition

Page 46: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.

Preventing Social EngineeringPreventing Social Engineering Train user not to reveal any Train user not to reveal any

information to outsidersinformation to outsiders Verify caller identityVerify caller identity

• Ask questionsAsk questions• Call back to confirmCall back to confirm

Security drillsSecurity drills

Page 47: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.
Page 48: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.
Page 49: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.
Page 50: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.

Defcon Social Engineering Defcon Social Engineering ContestContest

Link Ch 4kLink Ch 4k

Page 51: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.

The Art of Shoulder SurfingThe Art of Shoulder Surfing Shoulder surferShoulder surfer

• Reads what users enter on keyboardsReads what users enter on keyboards Logon namesLogon names PasswordsPasswords PINsPINs

Page 52: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.

Tools for Shoulder SurfingTools for Shoulder Surfing Binoculars or telescopes or cameras Binoculars or telescopes or cameras

in cell phonesin cell phones Knowledge of key positions and Knowledge of key positions and

typing techniquestyping techniques Knowledge of popular letter Knowledge of popular letter

substitutionssubstitutions• s equals $, a equals @s equals $, a equals @

Page 53: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.

The Art of Shoulder Surfing The Art of Shoulder Surfing (continued)(continued)

PreventionPrevention• Avoid typing when someone is nearbyAvoid typing when someone is nearby• Avoid typing when someone nearby is Avoid typing when someone nearby is

talking on cell phonetalking on cell phone• Computer monitors should face away Computer monitors should face away

from door or cubicle entrywayfrom door or cubicle entryway• Immediately change password if you Immediately change password if you

suspect someone is observing yoususpect someone is observing you

Page 54: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.

Dumpster DivingDumpster Diving Attacker finds information in victim’s trashAttacker finds information in victim’s trash

• Discarded computer manualsDiscarded computer manuals Notes or passwords written in themNotes or passwords written in them

• Telephone directoriesTelephone directories• Calendars with schedulesCalendars with schedules• Financial reportsFinancial reports• Interoffice memosInteroffice memos• Company policyCompany policy• Utility billsUtility bills• Resumes of employeesResumes of employees

Page 55: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.

The Art of Dumpster Diving The Art of Dumpster Diving (continued)(continued)

PreventionPrevention• Educate your users about dumpster Educate your users about dumpster

divingdiving• Proper trash disposalProper trash disposal• Use “disk shredder” software to erase Use “disk shredder” software to erase

disks before discarding themdisks before discarding them Software writes random bitsSoftware writes random bits Done at least seven timesDone at least seven times

• Discard computer manuals offsiteDiscard computer manuals offsite• Shred documents before disposalShred documents before disposal

Page 56: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.

PiggybackingPiggybacking Trailing closely behind an employee Trailing closely behind an employee

cleared to enter restricted areascleared to enter restricted areas How it works:How it works:

• Watch authorized personnel enter an areaWatch authorized personnel enter an area• Quickly join them at security entranceQuickly join them at security entrance• Exploit the desire of other to be polite and Exploit the desire of other to be polite and

helpfulhelpful• Attacker wears a fake badge or security Attacker wears a fake badge or security

cardcard

Page 57: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.

Piggybacking PreventionPiggybacking Prevention

• Use turnstilesUse turnstiles• Train personnel to notify the presence of Train personnel to notify the presence of

strangersstrangers• Do not hold secured doors for anyoneDo not hold secured doors for anyone

Even for people you knowEven for people you know• All employees must use secure cardsAll employees must use secure cards

Page 58: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.

PhishingPhishing Deceptive emails or text messagesDeceptive emails or text messages Can take money, passwords, or Can take money, passwords, or

install malware on your computerinstall malware on your computer

Page 59: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.

iClicker Questions

Page 60: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.

A.Zone transferB.Web bugC.PiggybackingD.DNSE.Cookie

Which technique marks your computer with a text file from a Web server?

Page 61: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.

A.Zone transferB.Web bugC.ProxyD.GhosteryE.GET

Which technique can find all the computers on a network?

Page 62: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.

A.Zone transferB.Web bugC.ProxyD.GhosteryE.GET

Which technique uses a tiny image to spy on Web browsers?

Page 63: Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Last modified 9-8-10.

A.PhishingB.ProxyC.PiggybackingD.Shoulder surfingE. Dumpster diving

Which technique defeats physical security at an entrance to a building?