module 2 foot printing

38
MODULE 2 MODULE 2 FOOT PRINTING FOOT PRINTING

Upload: leminhvuong

Post on 13-May-2015

5.050 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Module 2   Foot Printing

MODULE 2MODULE 2

FOOT PRINTINGFOOT PRINTING

Page 2: Module 2   Foot Printing

Khoa CNTT – ĐH Nông Lâm TP. HCM 2008 2/38

ObjectiveObjective

Overview of the Reconnaissance Phase Introducing Footprinting Understanding the information gathering

methodology of hackers Comprehending the Implications Learning some of the tools used for

reconnaissance phase FootPrinting steps

Page 3: Module 2   Foot Printing

Khoa CNTT – ĐH Nông Lâm TP. HCM 2008 3/38

Defining FootprintingDefining Footprinting Footprinting is the blueprinting of the security

profile of an organization, undertaken in a methodological manner.

Footprinting is one of the three pre-attack phases. The others are scanning and enumeration.

Footprinting results in a unique organization profile with respect to networks (Internet / Intranet / Extranet / Wireless) and systems involved.

An attacker will spend 90% of the time in profiling an organization and another 10% in launching the attack

Page 4: Module 2   Foot Printing

Khoa CNTT – ĐH Nông Lâm TP. HCM 2008 4/38

Information Gathering MethodologyInformation Gathering Methodology

Unearth initial information Locate the network range Ascertain active machines Discover open ports / access

points Detect operating systems Uncover services on ports Map the Network

Page 5: Module 2   Foot Printing

Khoa CNTT – ĐH Nông Lâm TP. HCM 2008 5/38

Unearthing Initial InformationUnearthing Initial InformationCommonly includes: Domain name lookup Locations Contacts (Telephone /

mail)Information Sources: Open source Whois NslookupHacking Tool: Sam Spade

Page 6: Module 2   Foot Printing

Khoa CNTT – ĐH Nông Lâm TP. HCM 2008 6/38

Finding a Company’s URL & Info.Finding a Company’s URL & Info. Search for a company’s URL using a search

engine such as www.google.com Type the company’s name in the search engine

to get the company URL Google provides rich information to perform

passive reconnaissance Check newsgroups, forums, and blogs for

sensitive information regarding the network

Page 7: Module 2   Foot Printing

Khoa CNTT – ĐH Nông Lâm TP. HCM 2008 7/38

People SearchPeople Search

Page 8: Module 2   Foot Printing

Khoa CNTT – ĐH Nông Lâm TP. HCM 2008 8/38

People Search WebsitePeople Search Website

Page 9: Module 2   Foot Printing

Khoa CNTT – ĐH Nông Lâm TP. HCM 2008 9/38

Satellite Picture of a ResidenceSatellite Picture of a Residence

Page 10: Module 2   Foot Printing

Khoa CNTT – ĐH Nông Lâm TP. HCM 2008 10/38

Public and Private WebsitesPublic and Private Websites

Page 11: Module 2   Foot Printing

Khoa CNTT – ĐH Nông Lâm TP. HCM 2008 11/38

DNS EnumeratorDNS Enumerator

Page 12: Module 2   Foot Printing

Khoa CNTT – ĐH Nông Lâm TP. HCM 2008 12/38

SpiderFootSpiderFoot SpiderFoot is a free, open-source, domain

footprinting tool which will scrape the websites on that domain, as well as search Google,Netcraft, Whois, and DNS to build up information like: Subdomains Affiliates Web server versions Users (i.e. /~user) Similar domains Email addresses Netblocks

Page 13: Module 2   Foot Printing

Khoa CNTT – ĐH Nông Lâm TP. HCM 2008 13/38

SpiderFootSpiderFoot

Page 14: Module 2   Foot Printing

Khoa CNTT – ĐH Nông Lâm TP. HCM 2008 14/38

Web Data Extractor ToolWeb Data Extractor Tool

Page 15: Module 2   Foot Printing

Khoa CNTT – ĐH Nông Lâm TP. HCM 2008 15/38

Additional Footprinting ToolsAdditional Footprinting Tools Whois Nslookup ARIN Neo Trace VisualRoute Trace SmartWhois eMailTrackerPro Website watcher Google Earth GEO Spider HTTrack Web Copier E-mail Spider

Page 16: Module 2   Foot Printing

Khoa CNTT – ĐH Nông Lâm TP. HCM 2008 16/38

Whois LookupWhois Lookup With whois lookup, you can get personal and

contact information For example, www.samspade.com

Page 17: Module 2   Foot Printing

Khoa CNTT – ĐH Nông Lâm TP. HCM 2008 17/38

WhoisWhois

Registrant: targetcompany (targetcompany-DOM) # Street Address City, Province State, Pin, Country Domain Name: targetcompany.COM

Domain servers in listed order: NS1.WEBHOST.COM XXX.XXX.XXX.XXX NS2.WEBHOST.COM XXX.XXX.XXX.XXX

Administrative Contact: Surname, Name (SNIDNo-ORG) [email protected] targetcompany (targetcompany-DOM) # Street Address City, Province, State, Pin, Country Telephone: XXXXX Fax XXXXXTechnical Contact: Surname, Name (SNIDNo-ORG) [email protected] targetcompany (targetcompany-DOM) # Street Address City, Province, State, Pin, Country Telephone: XXXXX Fax XXXXX

Page 18: Module 2   Foot Printing

Khoa CNTT – ĐH Nông Lâm TP. HCM 2008 18/38

Online Whois ToolsOnline Whois Tools

Page 19: Module 2   Foot Printing

Khoa CNTT – ĐH Nông Lâm TP. HCM 2008 19/38

NslookupNslookup Nslookup is a program to query Internet domain

name servers. Displays information that can be used to diagnose Domain Name System (DNS) infrastructure.

Helps find additional IP addresses if authoritative DNS is known from whois.

MX record reveals the IP of the mail server. Both Unix and Windows come with a Nslookup

client. Third party clients are also available – E.g. Sam

Spade

Page 20: Module 2   Foot Printing

Khoa CNTT – ĐH Nông Lâm TP. HCM 2008 20/38

NSLookup optionsNSLookup optionsSwitch Function nslookup Launches the nslookup program. host name Returns the IP address for the specified

host name. NAME Displays information about the host/domain

NAME using default server NAME1 NAME2 As above, but uses NAME2 as server help or? Displays information about common

commands set OPTION Sets an option domain=NAME Sets default domain name to NAME. root =NAME Sets root server to NAME. retry=X Sets number of retries to X. timeout=X Sets initial timeout interval to X seconds. type=X

Page 21: Module 2   Foot Printing

Khoa CNTT – ĐH Nông Lâm TP. HCM 2008 21/38

Types of DNS RecordsTypes of DNS Records

Page 22: Module 2   Foot Printing

Khoa CNTT – ĐH Nông Lâm TP. HCM 2008 22/38

Locate the Network RangeLocate the Network Range

Commonly includes: Finding the range of IP

addresses Discerning the subnet

mask

Information Sources: ARIN (American Registry

of Internet Numbers) Traceroute

Hacking Tool: NeoTrace Visual Route

Page 23: Module 2   Foot Printing

Khoa CNTT – ĐH Nông Lâm TP. HCM 2008 23/38

TracerouteTraceroute Traceroute works by exploiting a feature of the Internet

Protocol called TTL, or Time To Live. Traceroute reveals the path IP packets travel between

two systems by sending out consecutive UDP packets with ever-increasing TTLs .

As each router processes a IP packet, it decrements the TTL. When the TTL reaches zero, it sends back a "TTL exceeded" message (using ICMP) to the originator.

Routers with DNS entries reveal the name of routers, network affiliation and geographic location.

Page 24: Module 2   Foot Printing

Khoa CNTT – ĐH Nông Lâm TP. HCM 2008 24/38

Trace Route AnalysisTrace Route Analysis

Page 25: Module 2   Foot Printing

Khoa CNTT – ĐH Nông Lâm TP. HCM 2008 25/38

Trace Route AnalysisTrace Route Analysis

Page 26: Module 2   Foot Printing

Khoa CNTT – ĐH Nông Lâm TP. HCM 2008 26/38

Tool: NeoTrace (Now McAfee Visual Tool: NeoTrace (Now McAfee Visual Trace)Trace)

NeoTrace shows the traceroute output visually – map view, node view and IP view

Page 27: Module 2   Foot Printing

Khoa CNTT – ĐH Nông Lâm TP. HCM 2008 27/38

Tool: VisualRoute TraceTool: VisualRoute Trace

Page 28: Module 2   Foot Printing

Khoa CNTT – ĐH Nông Lâm TP. HCM 2008 28/38

Tool: Path Analyzer Pro - Tool: Path Analyzer Pro - http://vostrom.comhttp://vostrom.com

Page 29: Module 2   Foot Printing

Khoa CNTT – ĐH Nông Lâm TP. HCM 2008 29/38

Path Analyzer Pro ScreenshotPath Analyzer Pro Screenshot

Page 30: Module 2   Foot Printing

Khoa CNTT – ĐH Nông Lâm TP. HCM 2008 30/38

Path Analyzer Pro ScreenshotPath Analyzer Pro Screenshot

Page 31: Module 2   Foot Printing

Khoa CNTT – ĐH Nông Lâm TP. HCM 2008 31/38

Path Analyzer Pro ScreenshotPath Analyzer Pro Screenshot

Page 32: Module 2   Foot Printing

Khoa CNTT – ĐH Nông Lâm TP. HCM 2008 32/38

GoogleEarthGoogleEarth

Page 33: Module 2   Foot Printing

Khoa CNTT – ĐH Nông Lâm TP. HCM 2008 33/38

GoogleEarth Showing PentagonGoogleEarth Showing Pentagon

Page 34: Module 2   Foot Printing

Khoa CNTT – ĐH Nông Lâm TP. HCM 2008 34/38

Tool: SmartWhoisTool: SmartWhoisSmartWhois is a useful network information utility that allows you to find out all available information about an IP address, host name, or domain, including country, state or province, city, name of the network provider, administrator and technical support contact information

Unlike standard Whois utilities, SmartWhois can find the information about a computer located in any part of the world, intelligently querying the right database and delivering all the related records within a few seconds.

Page 35: Module 2   Foot Printing

Khoa CNTT – ĐH Nông Lâm TP. HCM 2008 35/38

Tool: eMailTrackerProTool: eMailTrackerPro

eMailTrackerPro is the e-mail analysis tool that enables analysis of an e-mail and its headers automatically and provides graphical results

Page 36: Module 2   Foot Printing

Khoa CNTT – ĐH Nông Lâm TP. HCM 2008 36/38

How to Setup a Fake Website?How to Setup a Fake Website?

Page 37: Module 2   Foot Printing

Khoa CNTT – ĐH Nông Lâm TP. HCM 2008 37/38

How to Setup a Fake Website?How to Setup a Fake Website?

Page 38: Module 2   Foot Printing

Khoa CNTT – ĐH Nông Lâm TP. HCM 2008 38/38

Website Stealing Tool: ReamweaverWebsite Stealing Tool: Reamweaver Reamweaver has everything you need to

instantly “steal" anyone's website, copying the real-time "look and feel" but letting you change any words, images, etc. that you choose

When a visitor visits a page on your stolen (mirrored) website, Reamweaver gets the page from the target domain, changes the words as you specify, and stores the result (along with images, etc.) in the fake website

With this tool your fake website will always look current, Reamweaver automatically updates the fake mirror when the content changes in the original website

Download: http://www.eccouncil.org/cehtools/reamweaver.zip