SlideShare a Scribd company logo
Ethical Hacking
Version 5
Module II
Footprinting
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Module Objective
This module will familiarize you with the following:
Overview of the Reconnaissance Phase
Footprinting: An Introduction
Information Gathering Methodology of Hackers
Competitive Intelligence gathering
Tools that aid in Footprinting
Footprinting steps
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Module Flow
Reconnaissance Phase
Steps to perform
Footprinting
Competitive Intelligence
Gathering
Information Gathering
Methodology
Tools Used for
Footprinting
Footprinting
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Revisiting Reconnaissance
Clearing
Tracks
Maintaining
Access
Gaining
Access
Scanning
Reconnaissance
Clearing
Tracks
Maintaining
Access
Gaining
Access
Scanning
Reconnaissance
Reconnaissance refers to the
preparatory phase where an
attacker seeks to gather as
much information as possible
about a target of evaluation
prior to launching an attack
It involves network scanning,
either external or internal,
without authorization
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Defining Footprinting
Footprinting is the blueprint of the
security profile of an organization,
undertaken in a methodological
manner
Footprinting is one of the three pre-
attack phases. The others are scanning
and enumeration
An attacker will spend 90% of the time
in profiling an organization and
another 10% in launching the attack
Footprinting results in a unique
organization profile with respect to
networks (Internet/
intranet/extranet/wireless) and
systems involved
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Information Gathering Methodology
Unearth initial information
Locate the network range
Ascertain active machines
Discover open ports/access points
Detect operating systems
Uncover services on ports
Map the network
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Unearthing Initial Information
Commonly includes:
• Domain name lookup
• Locations
• Contacts (telephone /
mail)
Information sources:
• Open source
• Whois
• Nslookup
Hacking tool
Sam Spade
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Finding a Company’s URL
Search for a company’s URL using a search engine such as
www.google.com
Type the company’s name in the search engine to get the company
URL
Google provides rich information to perform passive
reconnaissance
Check newsgroups, forums, and blogs for sensitive information
regarding the network
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Extracting Archive 0f a Website
You can get information on a company website since its
launch at www.archive.org
• For example: www.eccouncil.org
You can see updates made to the website
You can look for employee database, past products,
press releases, contact information, and more
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
People Search
You can find personal information using People search
For example, http://people.yahoo.com
• For example, http://www.intellius.com
You can get details like residential addresses, contact
numbers, date of birth, and change of location
You can get satellite pictures of private residences
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Footprinting Through Job Sites
You can gather company infrastructure details
from job postings
Look for company infrastructure postings such as
“looking for system administrator to manage
Solaris 10 network”
This means that the company has Solaris networks
on site
• E.g., www.jobsdb.com
Job requirements
Employee profile
Hardware information
Software information
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Passive Information Gathering
To understand the current security status of a particular Information
System, organizations perform either a Penetration Testing or other
hacking techniques
Passive information gathering is done by finding out the details that
are freely available over the Internet and by various other techniques
without directly coming in contact with the organization’s servers
Organizational and other informative websites are exceptions as the
information gathering activities carried out by an attacker do not
raise suspicion
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Competitive Intelligence Gathering
“Business moves fast. Product cycles are
measured in months, not years. Partners
become rivals quicker than you can say
‘breach of contract.’ So how can you possibly
hope to keep up with your competitors if you
can't keep an eye on them?”
Competitive intelligence gathering is the
process of gathering information about your
competitors from resources such as the
Internet
The competitive intelligence is non-
interfering and subtle in nature
Competitive intelligence is both a product and
a process
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Competitive Intelligence Gathering (cont’d)
The various issues involved in competitive intelligence are:
• Data gathering
• Data analysis
• Information verification
• Information security
Cognitive hacking:
• Single source
• Multiple source
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Why Do You Need Competitive
Intelligence?
Compare your products with that of your
competitors’ offerings
Analyze your market positioning compared to the
competitors
Pull up list of competing companies in the
market
Extract salesperson’s war stories on how deals
are won and lost in the competitive arena
Produce a profile of CEO and the entire
management staff of the competitor
Predict their tactics and methods based on their
previous track record
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Companies Providing Competitive
Intelligence Services
Carratu International
• http://www.carratu.com
CI Center
• http://www.cicentre.com
CORPORATE CRIME MANAGEMENT
• http://www.assesstherisk.com
Marven Consulting Group
• http://www.marwen.ca
SECURITY SCIENCES CORPORATION
• http://www.securitysciences.com
Lubrinco
• http://www.lubrinco.com
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Competitive Intelligence - When Did This
Company Begin? How Did It Develop?
Laser D for Annual Reports to Stockholders & 10-Ks (Reference Room -
workstation #12)
EDGAR database - for 10-K and other report filed with the SEC (also
Business Database Selection Tool)
International Directory of Company Histories (Reference - HD 2721 D36)
Mergent Online - company history and joint ventures (Business Database
Selection Tool)
Notable Corporate Chronologies (Reference - HD 2721 N67 1995)
ORION, UCLA's Online Library Information System (Business Database
Selection Tool)
Enter Search Terms: general electric [for books on GE] , click on
button: Search Subject Words
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Competitive Intelligence - Who Leads This
Company?
ABI/INFORM Global (Business Database Selection Tool)
Search for: microsoft in Subject; AND; biographies in
Subject; Search
Hoover's Online - Company Profile includes Key People. (Business
Database Selection Tool)
Also in print as Hoover's Handbook of American Business (Reference -
HG 4057 A28617)
National Newspaper Index (Business Database Selection Tool)
Type in: exxon ; Search
Reference Book of Corporate Managements (Reference Index Area,
section 5)
Who's Who in Finance and Industry (Reference Index Area, section 5)
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Competitive Intelligence - What Are This
Company's Plans?
ABI/INFORM Global (Business Database Selection Tool)
Search for: mci in Company/Org.; AND; alliances in Subject;
OR; market strategy in Subject; Search
LexisNexis Academic (Business Database Selection Tool)
Business; Industry & Market; Keyword: Palm; Industry:
Computer & Telecom; Date: Previous six months; Search
Business & Industry® (Web) (Business Database Selection
Tool)
200X BUS_IND, Open; Search/Modify, Company Name;
Search/Modify, Business Subject, Modify: Company
Forecasts; OK
Factiva (Business Database Selection Tool)
Enter free-text terms: intel near plans; Select date: in the last
year; Select sources: All Content; Run Search
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Competitive Intelligence - What Does
Expert Opinion Say About The Company?
ABI/INFORM Global [academics] (Business
Database Selection Tool)
First Call [analyst reports] (Business Database
Selection Tool)
FINDEX: Directory of Market Research
Reports (Reference - HF 5415.2 F493)
Market Research Monitor (Business Database
Selection Tool)
Multex [analyst reports] (Business Database
Selection Tool)
Nelson's Directory of Investment Research (Reference
- HG 4907 N43)
Wall Street Transcript "TWST Roundtable Forums"
and "CEO Forums" Features (Unbound Periodicals -
2nd floor)
[analysts' discussion of a given industry, see this
sample issue with Semiconductor Equipment Industry
Roundtable]
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Competitive Intelligence - Who Are The
Leading Competitors?
Business Rankings Annual (Reference - HG 4057 A353)
Hoover's Online - Top Competitors free, More
Competitors available, use (Business Database Selection
Tool)
Market Share Reporter (Reference - HF 5410 M37)
U.S. Patent and Trademark Office [identify players in
emerging product areas, see also other patent resources ]
Reference USA [companies by SICs and
more] (Business Database Selection Tool)
TableBase (Web) [find market shares within
articles] (Business Database Selection Tool)
Ward's Business Directory of U.S. Private and Public
Companies (Reference Room, Index Section 1)
World Market Share Reporter (Reference - HF 1416
W67)
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Public and Private Websites
A company might maintain public and private websites for
different levels of access
Footprint an organization’s public www servers
• Example:
– www.xsecurity.com
– www.xsecurity.net
– www.xsecurity.net
Footprint an organization’s sub domains (private)
• Example:
– http://partners.xsecurity.com
– http://intranet.xsecurity.com
– http://channels.xsecurity.com
– http://www2.xsecurity.com
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
DNS Enumerator
DNS Enumerator is an automated sub-domain retrieval tool
It scans Google to extract the results
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
SpiderFoot
SpiderFoot is a free, open-source, domain footprinting tool which
will scrape the websites on that domain, as well as search Google,
Netcraft, Whois, and DNS to build up information like:
• Subdomains
• Affiliates
• Web server versions
• Users (i.e. /~user)
• Similar domains
• Email addresses
• Netblocks
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
SpiderFoot
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Sensepost Footprint Tools - 1
www.sensepost.com
BiLE.pl
• BiLE leans on Google and HTTrack to automate the collections to and from
the target site, and then applies a simple statistical weighing algorithm to
deduce which websites have the strongest relationships with the target site
• Command:
– perl BiLE.pl www.sensepost.com sp_bile_out.txt
BiLE-weigh.pl
• BiLE-weigh, which takes the output of BiLE and calculates the significance of
each site found
• Command:
– perl bile-weigh.pl www.sensepost.com
sp_bile_out.txt.mine out.txt
tld-expand.pl
• The tld-expand.pl script is used to find domains in any other TLDs
• Command:
– perl exp-tld.pl [input file] [output file]
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Sensepost Footprint Tools - 2
www.sensepost.com
vet-IPrange.pl
• The results from the BiLE-weigh have listed a number of domains with
their relevance to target website
• Command:
– perl vet-IPrange.pl [input file] [true domain file] [output file]
<range>BiLE-weigh.pl
qtrace.pl
• qtrace is used to plot the boundaries of networks. It uses a heavily
modified traceroute using a #custom compiled hping# to perform
multiple traceroutes to boundary sections of a class C network
• Command:
– perl qtrace.pl [ip_address_file] [output_file]
vet-mx.pl
• The tool performs MX lookups for a list of domains, and stores each IP it
gets in a file
• Command:
– perl vet-mx.pl [input file] [true domain file] [output file]
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Sensepost Footprint Tools - 3
www.sensepost.com
jarf-rev
• jarf-rev is used to perform a reverse DNS lookup on an IP range. All
reverse entries that match the filter file are displayed to screen
• Command:
– perl jarf-rev [subnetblock]
– perl jarf-rev 192.168.37.1-192.168.37.118
jarf-dnsbrute
• The jarf-dnsbrute script is a DNS brute forcer, for when DNS zone
transfers are not allowed. jarf-dnsbrute will perform forward DNS
lookups using a specified domain name with a list of names for hosts.
• Command:
– perl jarf-dnsbrute [domain_name] [file_with_names]
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Wikito Footprinting Tool
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Web Data Extractor Tool
Use this tool to extract
targeted company’s
contact data (email,
phone, fax) from the
Internet
Extract url, meta tag
(title, desc, keyword) for
website promotion,
search directory creation,
web research
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Additional Footprinting Tools
Whois
Nslookup
ARIN
Neo Trace
VisualRoute Trace
SmartWhois
eMailTrackerPro
Website watcher
Google Earth
GEO Spider
HTTrack Web Copier
E-mail Spider
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Online Whois Tools
www.samspade.org
www.geektools.com
www.whois.net
www.demon.net
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Extract DNS information
Using www.dnsstuff.com, you can extract
DNS information such as:
• Mail server extensions
• IP addresses
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Types of DNS Records
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Necrosoft Advanced DIG
Necrosoft Advanced
DIG (ADIG) is a
TCP-based DNS
client that supports
most of the available
options, including
AXFR zone transfer
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Locate the Network Range
Commonly includes:
• Finding the range of IP
addresses
• Discerning the subnet
mask
Information Sources:
• ARIN (American Registry
of Internet Numbers)
• Traceroute
Hacking Tool:
• NeoTrace
• Visual Route
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
ARIN
http://www.arin.net/whois/
ARIN allows searches on the
whois database to locate
information on a network’s
autonomous system numbers
(ASNs), network-related
handles, and other related
point of contact (POC)
ARIN whois allows querying
the IP address to help find
information on the strategy
used for subnet addressing
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Traceroute
Traceroute works by exploiting a feature of the Internet
Protocol called TTL, or Time To Live
Traceroute reveals the path IP packets travel between two
systems by sending out consecutive sets of UDP or ICMP
packets with ever-increasing TTLs
As each router processes an IP packet, it decrements the
TTL. When the TTL reaches zero, that router sends back a
"TTL exceeded" message (using ICMP) to the originator
Routers with reverse DNS entries may reveal the name of
routers, network affiliation, and geographic location
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Trace Route Analysis
Traceroute is a program that can be used to determine the path
from source to destination
By using this information, an attacker determines the layout of a
network and the location of each device
For example, after running several traceroutes, an attacker might
obtain the following information:
• traceroute 1.10.10.20, second to last hop is 1.10.10.1
• traceroute 1.10.20.10, third to last hop is 1.10.10.1
• traceroute 1.10.20.10, second to last hop is 1.10.10.50
• traceroute 1.10.20.15, third to last hop is 1.10.10.1
• traceroute 1.10.20.15, second to last hop is 1.10.10.50
By putting this information together we can diagram the network
(see the next slide)
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Tool: NeoTrace (Now McAfee Visual
Trace)
NeoTrace shows the
traceroute output
visually – map view,
node view, and IP
view
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
GEOSpider
GEO Spider helps you to
detect, identify and
monitor your network
activity on world map
You can see website, IP
address location on the
Earth
GEO Spider can trace a
hacker, investigate a
website, trace a domain
name
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Geowhere Footprinting Tool
Geowhere handles many popular newsgroups to find answers to your
queries in an easy and fast manner
Geowhere can also seek information from country specific search engines
for better results
Use Geowhere to footprint an organization
• Newsgroups Search
• Mailing list finder
• Easy Web Search
• Daily News
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
GoogleEarth
Google Earth puts a
planet's worth of
imagery and other
geographic
information right on
your desktop
You can footprint the
location of a place
using GoogleEarth
Valuable tool for
Hackers
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Tool: VisualRoute Trace
www.visualware.com/download/
It shows the connection path
and the places where bottlenecks occur
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Kartoo Search Engine
www.kartoo.com
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Touchgraph Visual Browser
www.touchgraph.com
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Tool: SmartWhois
http://www.softdepia.com/smartwhois_download
_491.html
SmartWhois is a useful network information utility
that allows you to find out all available information
about an IP address, host name, or domain,
including country, state or province, city, name of
the network provider, administrator, and technical
support contact information
Unlike standard Whois utilities,
SmartWhois can find the
information about a computer
located in any part of the world,
intelligently querying the right
database and delivering all the
related records within a short time
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
VisualRoute Mail Tracker
It shows the number of
hops made and the
respective IP addresses,
the node name, location,
time zone, and network
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Tool: eMailTrackerPro
eMailTrackerPro is the email
analysis tool that enables analysis
of an email and its headers
automatically, and provides
graphical results
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Tool: Read Notify
www.readnotify.com
Mail Tracking is a tracking service that allows you to track when your mail was
read, for how long and how many times, and the place from where the mail has
been posted. It also records forwards and passing of sensitive information (MS
Office format)
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
HTTrack Web Site Copier
This tool mirrors an
entire website to the
desktop
You can footprint the
contents of an entire
website locally rather
than visiting the
individual pages
Valuable footprinting
tool
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Web Ripper Tool
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
robots.txt
This page located at the root folder holds a list of
directories and other resources on a site that the owner
does not want to be indexed by search engines
All search engines comply to robots.txt
You might not want private data and sensitive areas of a
site, such as script and binary locations indexed
Robots.txt file
User-agent: *
Disallow: /cgi-bin
Disallow: /cgi-perl
Disallow: /cgi-store
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Website Watcher
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
E-Mail Spiders
Have you ever wondered how Spammers generate a huge mailing
databases?
They pick tons of e-mail addresses from searching the Internet
All they need is a web spidering tool picking up e-mail addresses
and storing them to a database
If these tools are left running the entire night, they can capture
hundreds of thousands of e-mail addresses
Tools:
• Web data Extractor
• 1st E-mail Address Spider
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
1st E-mail Address Spider
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Power E-mail Collector Tool
Power E-mail Collector is a powerful email address harvesting program
It can collect up to 750,000 unique valid email addresses per hour with a
Cable/DSL connection
It only collects valid email addresses
You do not have to worry about ending up with undeliverable addresses
How does it work?
• Just enter a domain that you want to collect email addresses from and press the
start button. The program opens up many simultaneous connections to the
domain and begins collecting addresses
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Steps to Perform Footprinting
Find companies’ external and internal URLs
Perform whois lookup for personal details
Extract DNS information
Mirror the entire website and look up names
Extract archives of the website
Google search for company’s news and press releases
Use people search for personal information of employees
Find the physical location of the web server using the tool
“NeoTracer”
Analyze company’s infrastructure details from job postings
Track the email using “readnotify.com”
EC-Council
Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Summary
Information gathering phase can be categorized broadly into seven
phases
Footprinting renders a unique security profile of a target system
Whois and ARIN can reveal public information of a domain that can
be leveraged further
Traceroute and mail tracking can be used to target specific IP, and
later for IP spoofing
Nslookup can reveal specific users, and zone transfers can
compromise DNS security

More Related Content

PDF
Ceh v5 module 01 introduction to ethical hacking
PDF
Ceh v5 module 11 hacking webservers
PDF
Ceh v5 module 03 scanning
PPTX
Ethical Hacking
PDF
Ceh v5 module 04 enumeration
PPTX
Ethical Hacking PPT (CEH)
PDF
Ceh v5 module 07 sniffers
PPT
Introduction to Web Application Penetration Testing
Ceh v5 module 01 introduction to ethical hacking
Ceh v5 module 11 hacking webservers
Ceh v5 module 03 scanning
Ethical Hacking
Ceh v5 module 04 enumeration
Ethical Hacking PPT (CEH)
Ceh v5 module 07 sniffers
Introduction to Web Application Penetration Testing

What's hot (20)

PDF
Footprinting
PPTX
Encryption
PPTX
Web application security
PPT
Penetration Testing Basics
PPT
Ethical Hacking
PPTX
Ethical hacking - Footprinting.pptx
PPTX
Footprinting and reconnaissance
PPTX
Cse ethical hacking ppt
PDF
Ceh v5 module 09 social engineering
PPT
PPTX
Ethical hacking/ Penetration Testing
PPTX
Ethical hacking : Its methodologies and tools
PPT
hacking
PPT
Phishing
PPTX
Ethical Hacking
PDF
Ceh v5 module 12 web application vulnerabilities
PDF
Ceh v5 module 19 evading ids firewall and honeypot
PPTX
Ethical hacking ppt
PPTX
Ethical hacking
Footprinting
Encryption
Web application security
Penetration Testing Basics
Ethical Hacking
Ethical hacking - Footprinting.pptx
Footprinting and reconnaissance
Cse ethical hacking ppt
Ceh v5 module 09 social engineering
Ethical hacking/ Penetration Testing
Ethical hacking : Its methodologies and tools
hacking
Phishing
Ethical Hacking
Ceh v5 module 12 web application vulnerabilities
Ceh v5 module 19 evading ids firewall and honeypot
Ethical hacking ppt
Ethical hacking
Ad

Viewers also liked (13)

PDF
Ceh v5 module 20 buffer overflow
PDF
Ceh v5 module 18 linux hacking
PPTX
Anatomy Of Hack
PDF
CATALOGUE QUESTEK (Tiếng Việt)
PDF
Ceh v5 module 06 trojans and backdoors
PDF
Presentation buffer overflow attacks and theircountermeasures
PDF
Ceh v5 module 05 system hacking
PDF
Footprinting tools for security auditors
PDF
Hackers and Hacking a brief overview 5-26-2016
PDF
Ethical hacking
PDF
Ceh v8 Labs - Module18: Buffer Overflow.
PPTX
Banking system ppt
Ceh v5 module 20 buffer overflow
Ceh v5 module 18 linux hacking
Anatomy Of Hack
CATALOGUE QUESTEK (Tiếng Việt)
Ceh v5 module 06 trojans and backdoors
Presentation buffer overflow attacks and theircountermeasures
Ceh v5 module 05 system hacking
Footprinting tools for security auditors
Hackers and Hacking a brief overview 5-26-2016
Ethical hacking
Ceh v8 Labs - Module18: Buffer Overflow.
Banking system ppt
Ad

Similar to Ceh v5 module 02 footprinting (20)

PDF
Ethical hacking and countermeasures
PDF
Certified ethicalhacking classroom_1382954076
PDF
Ceh v8-course-outline
PPT
Aslapr market research for entrepreneurs mg irc presentation 09 22-14
PPTX
Conf2013 bchristensen thebig_t
PPT
Ahwatukee CoC Market Research for Entrepreneurs Presentation 11_19_14
PPTX
GDPR and EA - Commissioning a web site
PDF
Testing the Intelligence of your AI
PPTX
Top 5 EC-Council Certifications That You Should Look Into in 2022.pptx
PPTX
OSS - enterprise adoption strategy and governance
PPTX
Using Information Technology to Engage in Electronic Commerce
PPTX
Electronic Commerce
PDF
Super data-charging your corruption reviews with integrated analytics
PPT
PDF
Data Security and Data Governance: Foundation and Case Studies - November 4, ...
PDF
II-SDV 2015, 20 - 21 April 2015 in Nice
PPTX
Hackathon 3.0 idea Carbon footprint on blockchain with IoT
PDF
ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.
PPT
Introduction To Sciov1 0
PPTX
what is shodan a full presentation pptx
Ethical hacking and countermeasures
Certified ethicalhacking classroom_1382954076
Ceh v8-course-outline
Aslapr market research for entrepreneurs mg irc presentation 09 22-14
Conf2013 bchristensen thebig_t
Ahwatukee CoC Market Research for Entrepreneurs Presentation 11_19_14
GDPR and EA - Commissioning a web site
Testing the Intelligence of your AI
Top 5 EC-Council Certifications That You Should Look Into in 2022.pptx
OSS - enterprise adoption strategy and governance
Using Information Technology to Engage in Electronic Commerce
Electronic Commerce
Super data-charging your corruption reviews with integrated analytics
Data Security and Data Governance: Foundation and Case Studies - November 4, ...
II-SDV 2015, 20 - 21 April 2015 in Nice
Hackathon 3.0 idea Carbon footprint on blockchain with IoT
ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.
Introduction To Sciov1 0
what is shodan a full presentation pptx

More from Vi Tính Hoàng Nam (20)

PDF
CATALOG KBVISION (Tiếng Việt)
PDF
Catalogue 2015
PDF
Tl wr740 n-v4_user_guide_1910010682_vn
PDF
CATALOGUE CAMERA GIÁM SÁT
PDF
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
PDF
Các loại cáp mạng
PDF
Catalogue 10-2014-new
PDF
PDF
Camera QTX-1210
PDF
Brochua đầu ghi hình QTD-6100 Series
PDF
NSRT: Dụng cụ tháo đầu báo
PDF
SLV-24N: Đầu báo khói quang
PDF
SLV-24N: Đầu báo khói quang
PDF
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PDF
HRA-1000: Hiển thị phụ cho TT HCP-1008E
PDF
RPP-ABW: TT báo cháy 10-20 kênh
PDF
RPP-ECW: TT báo cháy 3-5 kênh
PDF
HCP-1008E: TT báo cháy 8-24 kênh
PDF
HCV-2/4/8: TT báo cháy 2,4,8 kênh
PDF
I phone v1.2_e
CATALOG KBVISION (Tiếng Việt)
Catalogue 2015
Tl wr740 n-v4_user_guide_1910010682_vn
CATALOGUE CAMERA GIÁM SÁT
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
Các loại cáp mạng
Catalogue 10-2014-new
Camera QTX-1210
Brochua đầu ghi hình QTD-6100 Series
NSRT: Dụng cụ tháo đầu báo
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quang
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
HRA-1000: Hiển thị phụ cho TT HCP-1008E
RPP-ABW: TT báo cháy 10-20 kênh
RPP-ECW: TT báo cháy 3-5 kênh
HCP-1008E: TT báo cháy 8-24 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênh
I phone v1.2_e

Recently uploaded (20)

PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
A Presentation on Artificial Intelligence
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPT
Teaching material agriculture food technology
PDF
Encapsulation theory and applications.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Approach and Philosophy of On baking technology
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
“AI and Expert System Decision Support & Business Intelligence Systems”
Understanding_Digital_Forensics_Presentation.pptx
20250228 LYD VKU AI Blended-Learning.pptx
A Presentation on Artificial Intelligence
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Encapsulation_ Review paper, used for researhc scholars
Mobile App Security Testing_ A Comprehensive Guide.pdf
Big Data Technologies - Introduction.pptx
Review of recent advances in non-invasive hemoglobin estimation
Teaching material agriculture food technology
Encapsulation theory and applications.pdf
Electronic commerce courselecture one. Pdf
Unlocking AI with Model Context Protocol (MCP)
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Approach and Philosophy of On baking technology
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Spectral efficient network and resource selection model in 5G networks
Digital-Transformation-Roadmap-for-Companies.pptx
Chapter 3 Spatial Domain Image Processing.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows

Ceh v5 module 02 footprinting

  • 2. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Module Objective This module will familiarize you with the following: Overview of the Reconnaissance Phase Footprinting: An Introduction Information Gathering Methodology of Hackers Competitive Intelligence gathering Tools that aid in Footprinting Footprinting steps
  • 3. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Module Flow Reconnaissance Phase Steps to perform Footprinting Competitive Intelligence Gathering Information Gathering Methodology Tools Used for Footprinting Footprinting
  • 4. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Revisiting Reconnaissance Clearing Tracks Maintaining Access Gaining Access Scanning Reconnaissance Clearing Tracks Maintaining Access Gaining Access Scanning Reconnaissance Reconnaissance refers to the preparatory phase where an attacker seeks to gather as much information as possible about a target of evaluation prior to launching an attack It involves network scanning, either external or internal, without authorization
  • 5. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Defining Footprinting Footprinting is the blueprint of the security profile of an organization, undertaken in a methodological manner Footprinting is one of the three pre- attack phases. The others are scanning and enumeration An attacker will spend 90% of the time in profiling an organization and another 10% in launching the attack Footprinting results in a unique organization profile with respect to networks (Internet/ intranet/extranet/wireless) and systems involved
  • 6. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Information Gathering Methodology Unearth initial information Locate the network range Ascertain active machines Discover open ports/access points Detect operating systems Uncover services on ports Map the network
  • 7. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Unearthing Initial Information Commonly includes: • Domain name lookup • Locations • Contacts (telephone / mail) Information sources: • Open source • Whois • Nslookup Hacking tool Sam Spade
  • 8. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Finding a Company’s URL Search for a company’s URL using a search engine such as www.google.com Type the company’s name in the search engine to get the company URL Google provides rich information to perform passive reconnaissance Check newsgroups, forums, and blogs for sensitive information regarding the network
  • 9. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Extracting Archive 0f a Website You can get information on a company website since its launch at www.archive.org • For example: www.eccouncil.org You can see updates made to the website You can look for employee database, past products, press releases, contact information, and more
  • 10. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited People Search You can find personal information using People search For example, http://people.yahoo.com • For example, http://www.intellius.com You can get details like residential addresses, contact numbers, date of birth, and change of location You can get satellite pictures of private residences
  • 11. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Footprinting Through Job Sites You can gather company infrastructure details from job postings Look for company infrastructure postings such as “looking for system administrator to manage Solaris 10 network” This means that the company has Solaris networks on site • E.g., www.jobsdb.com Job requirements Employee profile Hardware information Software information
  • 12. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Passive Information Gathering To understand the current security status of a particular Information System, organizations perform either a Penetration Testing or other hacking techniques Passive information gathering is done by finding out the details that are freely available over the Internet and by various other techniques without directly coming in contact with the organization’s servers Organizational and other informative websites are exceptions as the information gathering activities carried out by an attacker do not raise suspicion
  • 13. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Competitive Intelligence Gathering “Business moves fast. Product cycles are measured in months, not years. Partners become rivals quicker than you can say ‘breach of contract.’ So how can you possibly hope to keep up with your competitors if you can't keep an eye on them?” Competitive intelligence gathering is the process of gathering information about your competitors from resources such as the Internet The competitive intelligence is non- interfering and subtle in nature Competitive intelligence is both a product and a process
  • 14. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Competitive Intelligence Gathering (cont’d) The various issues involved in competitive intelligence are: • Data gathering • Data analysis • Information verification • Information security Cognitive hacking: • Single source • Multiple source
  • 15. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Why Do You Need Competitive Intelligence? Compare your products with that of your competitors’ offerings Analyze your market positioning compared to the competitors Pull up list of competing companies in the market Extract salesperson’s war stories on how deals are won and lost in the competitive arena Produce a profile of CEO and the entire management staff of the competitor Predict their tactics and methods based on their previous track record
  • 16. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Companies Providing Competitive Intelligence Services Carratu International • http://www.carratu.com CI Center • http://www.cicentre.com CORPORATE CRIME MANAGEMENT • http://www.assesstherisk.com Marven Consulting Group • http://www.marwen.ca SECURITY SCIENCES CORPORATION • http://www.securitysciences.com Lubrinco • http://www.lubrinco.com
  • 17. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Competitive Intelligence - When Did This Company Begin? How Did It Develop? Laser D for Annual Reports to Stockholders & 10-Ks (Reference Room - workstation #12) EDGAR database - for 10-K and other report filed with the SEC (also Business Database Selection Tool) International Directory of Company Histories (Reference - HD 2721 D36) Mergent Online - company history and joint ventures (Business Database Selection Tool) Notable Corporate Chronologies (Reference - HD 2721 N67 1995) ORION, UCLA's Online Library Information System (Business Database Selection Tool) Enter Search Terms: general electric [for books on GE] , click on button: Search Subject Words
  • 18. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Competitive Intelligence - Who Leads This Company? ABI/INFORM Global (Business Database Selection Tool) Search for: microsoft in Subject; AND; biographies in Subject; Search Hoover's Online - Company Profile includes Key People. (Business Database Selection Tool) Also in print as Hoover's Handbook of American Business (Reference - HG 4057 A28617) National Newspaper Index (Business Database Selection Tool) Type in: exxon ; Search Reference Book of Corporate Managements (Reference Index Area, section 5) Who's Who in Finance and Industry (Reference Index Area, section 5)
  • 19. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Competitive Intelligence - What Are This Company's Plans? ABI/INFORM Global (Business Database Selection Tool) Search for: mci in Company/Org.; AND; alliances in Subject; OR; market strategy in Subject; Search LexisNexis Academic (Business Database Selection Tool) Business; Industry & Market; Keyword: Palm; Industry: Computer & Telecom; Date: Previous six months; Search Business & Industry® (Web) (Business Database Selection Tool) 200X BUS_IND, Open; Search/Modify, Company Name; Search/Modify, Business Subject, Modify: Company Forecasts; OK Factiva (Business Database Selection Tool) Enter free-text terms: intel near plans; Select date: in the last year; Select sources: All Content; Run Search
  • 20. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Competitive Intelligence - What Does Expert Opinion Say About The Company? ABI/INFORM Global [academics] (Business Database Selection Tool) First Call [analyst reports] (Business Database Selection Tool) FINDEX: Directory of Market Research Reports (Reference - HF 5415.2 F493) Market Research Monitor (Business Database Selection Tool) Multex [analyst reports] (Business Database Selection Tool) Nelson's Directory of Investment Research (Reference - HG 4907 N43) Wall Street Transcript "TWST Roundtable Forums" and "CEO Forums" Features (Unbound Periodicals - 2nd floor) [analysts' discussion of a given industry, see this sample issue with Semiconductor Equipment Industry Roundtable]
  • 21. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Competitive Intelligence - Who Are The Leading Competitors? Business Rankings Annual (Reference - HG 4057 A353) Hoover's Online - Top Competitors free, More Competitors available, use (Business Database Selection Tool) Market Share Reporter (Reference - HF 5410 M37) U.S. Patent and Trademark Office [identify players in emerging product areas, see also other patent resources ] Reference USA [companies by SICs and more] (Business Database Selection Tool) TableBase (Web) [find market shares within articles] (Business Database Selection Tool) Ward's Business Directory of U.S. Private and Public Companies (Reference Room, Index Section 1) World Market Share Reporter (Reference - HF 1416 W67)
  • 22. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Public and Private Websites A company might maintain public and private websites for different levels of access Footprint an organization’s public www servers • Example: – www.xsecurity.com – www.xsecurity.net – www.xsecurity.net Footprint an organization’s sub domains (private) • Example: – http://partners.xsecurity.com – http://intranet.xsecurity.com – http://channels.xsecurity.com – http://www2.xsecurity.com
  • 23. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited DNS Enumerator DNS Enumerator is an automated sub-domain retrieval tool It scans Google to extract the results
  • 24. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited SpiderFoot SpiderFoot is a free, open-source, domain footprinting tool which will scrape the websites on that domain, as well as search Google, Netcraft, Whois, and DNS to build up information like: • Subdomains • Affiliates • Web server versions • Users (i.e. /~user) • Similar domains • Email addresses • Netblocks
  • 25. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited SpiderFoot
  • 26. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Sensepost Footprint Tools - 1 www.sensepost.com BiLE.pl • BiLE leans on Google and HTTrack to automate the collections to and from the target site, and then applies a simple statistical weighing algorithm to deduce which websites have the strongest relationships with the target site • Command: – perl BiLE.pl www.sensepost.com sp_bile_out.txt BiLE-weigh.pl • BiLE-weigh, which takes the output of BiLE and calculates the significance of each site found • Command: – perl bile-weigh.pl www.sensepost.com sp_bile_out.txt.mine out.txt tld-expand.pl • The tld-expand.pl script is used to find domains in any other TLDs • Command: – perl exp-tld.pl [input file] [output file]
  • 27. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Sensepost Footprint Tools - 2 www.sensepost.com vet-IPrange.pl • The results from the BiLE-weigh have listed a number of domains with their relevance to target website • Command: – perl vet-IPrange.pl [input file] [true domain file] [output file] <range>BiLE-weigh.pl qtrace.pl • qtrace is used to plot the boundaries of networks. It uses a heavily modified traceroute using a #custom compiled hping# to perform multiple traceroutes to boundary sections of a class C network • Command: – perl qtrace.pl [ip_address_file] [output_file] vet-mx.pl • The tool performs MX lookups for a list of domains, and stores each IP it gets in a file • Command: – perl vet-mx.pl [input file] [true domain file] [output file]
  • 28. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Sensepost Footprint Tools - 3 www.sensepost.com jarf-rev • jarf-rev is used to perform a reverse DNS lookup on an IP range. All reverse entries that match the filter file are displayed to screen • Command: – perl jarf-rev [subnetblock] – perl jarf-rev 192.168.37.1-192.168.37.118 jarf-dnsbrute • The jarf-dnsbrute script is a DNS brute forcer, for when DNS zone transfers are not allowed. jarf-dnsbrute will perform forward DNS lookups using a specified domain name with a list of names for hosts. • Command: – perl jarf-dnsbrute [domain_name] [file_with_names]
  • 29. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Wikito Footprinting Tool
  • 30. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Web Data Extractor Tool Use this tool to extract targeted company’s contact data (email, phone, fax) from the Internet Extract url, meta tag (title, desc, keyword) for website promotion, search directory creation, web research
  • 31. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Additional Footprinting Tools Whois Nslookup ARIN Neo Trace VisualRoute Trace SmartWhois eMailTrackerPro Website watcher Google Earth GEO Spider HTTrack Web Copier E-mail Spider
  • 32. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Online Whois Tools www.samspade.org www.geektools.com www.whois.net www.demon.net
  • 33. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Extract DNS information Using www.dnsstuff.com, you can extract DNS information such as: • Mail server extensions • IP addresses
  • 34. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Types of DNS Records
  • 35. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Necrosoft Advanced DIG Necrosoft Advanced DIG (ADIG) is a TCP-based DNS client that supports most of the available options, including AXFR zone transfer
  • 36. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Locate the Network Range Commonly includes: • Finding the range of IP addresses • Discerning the subnet mask Information Sources: • ARIN (American Registry of Internet Numbers) • Traceroute Hacking Tool: • NeoTrace • Visual Route
  • 37. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited ARIN http://www.arin.net/whois/ ARIN allows searches on the whois database to locate information on a network’s autonomous system numbers (ASNs), network-related handles, and other related point of contact (POC) ARIN whois allows querying the IP address to help find information on the strategy used for subnet addressing
  • 38. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Traceroute Traceroute works by exploiting a feature of the Internet Protocol called TTL, or Time To Live Traceroute reveals the path IP packets travel between two systems by sending out consecutive sets of UDP or ICMP packets with ever-increasing TTLs As each router processes an IP packet, it decrements the TTL. When the TTL reaches zero, that router sends back a "TTL exceeded" message (using ICMP) to the originator Routers with reverse DNS entries may reveal the name of routers, network affiliation, and geographic location
  • 39. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Trace Route Analysis Traceroute is a program that can be used to determine the path from source to destination By using this information, an attacker determines the layout of a network and the location of each device For example, after running several traceroutes, an attacker might obtain the following information: • traceroute 1.10.10.20, second to last hop is 1.10.10.1 • traceroute 1.10.20.10, third to last hop is 1.10.10.1 • traceroute 1.10.20.10, second to last hop is 1.10.10.50 • traceroute 1.10.20.15, third to last hop is 1.10.10.1 • traceroute 1.10.20.15, second to last hop is 1.10.10.50 By putting this information together we can diagram the network (see the next slide)
  • 40. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Tool: NeoTrace (Now McAfee Visual Trace) NeoTrace shows the traceroute output visually – map view, node view, and IP view
  • 41. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited GEOSpider GEO Spider helps you to detect, identify and monitor your network activity on world map You can see website, IP address location on the Earth GEO Spider can trace a hacker, investigate a website, trace a domain name
  • 42. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Geowhere Footprinting Tool Geowhere handles many popular newsgroups to find answers to your queries in an easy and fast manner Geowhere can also seek information from country specific search engines for better results Use Geowhere to footprint an organization • Newsgroups Search • Mailing list finder • Easy Web Search • Daily News
  • 43. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited GoogleEarth Google Earth puts a planet's worth of imagery and other geographic information right on your desktop You can footprint the location of a place using GoogleEarth Valuable tool for Hackers
  • 44. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Tool: VisualRoute Trace www.visualware.com/download/ It shows the connection path and the places where bottlenecks occur
  • 45. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Kartoo Search Engine www.kartoo.com
  • 46. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Touchgraph Visual Browser www.touchgraph.com
  • 47. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Tool: SmartWhois http://www.softdepia.com/smartwhois_download _491.html SmartWhois is a useful network information utility that allows you to find out all available information about an IP address, host name, or domain, including country, state or province, city, name of the network provider, administrator, and technical support contact information Unlike standard Whois utilities, SmartWhois can find the information about a computer located in any part of the world, intelligently querying the right database and delivering all the related records within a short time
  • 48. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited VisualRoute Mail Tracker It shows the number of hops made and the respective IP addresses, the node name, location, time zone, and network
  • 49. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Tool: eMailTrackerPro eMailTrackerPro is the email analysis tool that enables analysis of an email and its headers automatically, and provides graphical results
  • 50. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Tool: Read Notify www.readnotify.com Mail Tracking is a tracking service that allows you to track when your mail was read, for how long and how many times, and the place from where the mail has been posted. It also records forwards and passing of sensitive information (MS Office format)
  • 51. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited HTTrack Web Site Copier This tool mirrors an entire website to the desktop You can footprint the contents of an entire website locally rather than visiting the individual pages Valuable footprinting tool
  • 52. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Web Ripper Tool
  • 53. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited robots.txt This page located at the root folder holds a list of directories and other resources on a site that the owner does not want to be indexed by search engines All search engines comply to robots.txt You might not want private data and sensitive areas of a site, such as script and binary locations indexed Robots.txt file User-agent: * Disallow: /cgi-bin Disallow: /cgi-perl Disallow: /cgi-store
  • 54. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Website Watcher
  • 55. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited E-Mail Spiders Have you ever wondered how Spammers generate a huge mailing databases? They pick tons of e-mail addresses from searching the Internet All they need is a web spidering tool picking up e-mail addresses and storing them to a database If these tools are left running the entire night, they can capture hundreds of thousands of e-mail addresses Tools: • Web data Extractor • 1st E-mail Address Spider
  • 56. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited 1st E-mail Address Spider
  • 57. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Power E-mail Collector Tool Power E-mail Collector is a powerful email address harvesting program It can collect up to 750,000 unique valid email addresses per hour with a Cable/DSL connection It only collects valid email addresses You do not have to worry about ending up with undeliverable addresses How does it work? • Just enter a domain that you want to collect email addresses from and press the start button. The program opens up many simultaneous connections to the domain and begins collecting addresses
  • 58. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Steps to Perform Footprinting Find companies’ external and internal URLs Perform whois lookup for personal details Extract DNS information Mirror the entire website and look up names Extract archives of the website Google search for company’s news and press releases Use people search for personal information of employees Find the physical location of the web server using the tool “NeoTracer” Analyze company’s infrastructure details from job postings Track the email using “readnotify.com”
  • 59. EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Summary Information gathering phase can be categorized broadly into seven phases Footprinting renders a unique security profile of a target system Whois and ARIN can reveal public information of a domain that can be leveraged further Traceroute and mail tracking can be used to target specific IP, and later for IP spoofing Nslookup can reveal specific users, and zone transfers can compromise DNS security