SlideShare a Scribd company logo
Footprinting for securty auditors
Security track
Footprinting for security auditors
Jose Manuel Ortega
@jmortegac
Footprinting for securty auditors
Agenda
• Information gathering
• Footprinting tools
• Port scanning with nmap
• Nmap scripts
Footprinting for securty auditors
Security auditing phases
Analyze publicly
available
information. Set
scope of attack
and identify key
targets.
Check for
vulnerabilities
on each target
resource
Attack targets
using library of
tools and
techniques
Footprint
Analysis
Who is
DNS Lookup
Search Engines
Enumeration
Exploitation
Buffer Overflows
Spoofing
Password
Rootkit
Scanning
Machines
Ports
Applications
Footprinting for securty auditors
Security Track
Information Gathering
Footprinting for securty auditors
Footprinting (gather target information)
➔ names, addresses, system types, ...
Scanning (detect systems and services)
➔ response from network stack, applications, ...
Fingerprinting (identify topologies & systems)
➔ network layout, operating systems, services
passive
passive
or
active
active
Enumeration (collect access information)
➔ list of user accounts, share names, …
Sniffing (collect network traffic)
➔ addresses, names, information (passwords, ...)
Information gathering
Footprinting for securty auditors
Footprinting
• Identify locations, domain names, IP address
ranges, e-mail addresses, dial-in phone
numbers, systems used, administrator
names, network topology.
• Using public information.
• Without network /physical connection to the
target.
Footprinting for securty auditors
Security Track
Tools
Footprinting for securty auditors
Kali Linux
Footprinting for securty auditors
Whois Online Tools
• Get information about domains, IP address, DNS
• Identify the domain names and associated networks related to a
particular organization
• https://www.whois.net/
• https://tools.whois.net/
• http://www.whois.com/whois
• http://who.is
• http://toolbar.netcraft.com/site_report
• http://whois.domaintools.com/
Footprinting for securty auditors
Netcraft
• http://toolbar.netcraft.com/site_report/?url=fosdem.org
Footprinting for securty auditors
Whois
Footprinting for securty auditors
Whois command
Footprinting for securty auditors
Host command
• Ge IPv4,v6,mail server
Footprinting for securty auditors
Network tools
• http://network-tools.com/
Footprinting for securty auditors
NETWORK Tools
• https://www.dnssniffer.com/networktools
Footprinting for securty auditors
Footprinting for securty auditors
Robtex
• Provides graphical information from DNS and Whois
• https://www.robtex.com/dns-lookup/fosdem.org
Footprinting for securty auditors
Robtex
Footprinting for securty auditors
Nslookup
• Query DNS server in order to extract valuable information about the
host machine.
• Find names of machines through a domain/zone transfer
• Nslookup -d→ list all associated records for the domain
Footprinting for securty auditors
Dig /DNS Resolver
Footprinting for securty auditors
Dnsmap
Footprinting for securty auditors
Dnsenum
Footprinting for securty auditors
DnsRecon
Footprinting for securty auditors
Zone Transfer
• How does one provide security against DNS Interrogation?
• Restrict zone transfers to authorized servers.
• Set your firewall or router to deny all unauthorized inbound
connections to TCP port 53
• Best practice to restrict Zone transfers is review file
configuration /etc/bind/named.conf.local
Footprinting for securty auditors
Zone Transfer
Footprinting for securty auditors
The harvester
• Catalogue email address and subdomains from a specific domain.
• It works with all the major search engines including Bing and Google.
• The objective is to gather emails, subdomains, hosts, employee
names, open ports and banners from different public sources like
search engines, PGP key servers and SHODAN computer database.
Footprinting for securty auditors
The harvester
Footprinting for securty auditors
The harvester
Footprinting for securty auditors
Subdomains
• https://api.hackertarget.com/hostsearch/?q=fosdem.org
Footprinting for securty auditors
Maltego
Footprinting for securty auditors
Maltego
∙ Company Stalker (this gathers email information)
∙ Footprint L1 (basic information gathering)
∙ Footprint L2 (moderate amount of information
gathering)
∙ Footprint L3 (intense and the most complete
information gathering)
Footprinting for securty auditors
Maltego
Footprinting for securty auditors
Shodan
Footprinting for securty auditors
Censys.io
Footprinting for securty auditors
Mr looquer
Footprinting for securty auditors
Web robots
• https://wordpress.com/robots.txt
• https://wordpress.com/sitemap.xml
Footprinting for securty auditors
Web Archive
Footprinting for securty auditors
Spider foot
Footprinting for securty auditors
Spider foot
Footprinting for securty auditors
Scanning tools
• Active footprinting
• Number and type of opened ports
• Type of services running in the servers
• Vulnerabilities of the services and software
• Nmap is a great tool for discovering Open ports, protocol
numbers, OS details, firewall details, etc.
Footprinting for securty auditors
Security Track
NMAP
Footprinting for securty auditors
Nmap Port Scanner
• Unix-based port scanner
• Support for different
scanning techniques
• Detects operating system
of remote hosts
• Many configuration options
- timing
- scanned port range
- scan method
• Various front ends
for easier handling
Footprinting for securty auditors
Zenmap Port Scanner
Footprinting for securty auditors
Zenmap Port Scanner
Footprinting for securty auditors
Sparta
Footprinting for securty auditors
Nmap whois
Footprinting for securty auditors
Guessing the Operating System
• We can use the --osscan-guess option to force Nmap
into discovering the OS.
Footprinting for securty auditors
Banner Grabbing
nmap -p80 -sV -sT fosdem.org
Footprinting for securty auditors
Nmap Script Engine
• Simple scripts to automate a wide variety of networking
tasks
• Are written in Lua programming language.
• Network discovery
• Vulnerability detection
• Backdoor detection
• Vulnerability exploitation
Footprinting for securty auditors
Nmap Script Engine
usr/local/share/nmap/scripts
Footprinting for securty auditors
Nmap Script Engine
• https://github.com/cldrn/nmap-nse-scripts/tree/master/
scripts
Footprinting for securty auditors
Banner grabbing with nmap script
nmap --script banner fosdem.org
Footprinting for securty auditors
http-enum script
nmap -v --script http-enum.nse fosdem.org
Footprinting for securty auditors
↘mysql-databases
nmap -v -d -p3306 --script mysql-databases.nse
--script-args='mysqluser=root' 192.168.100.8
Footprinting for securty auditors
↘mysql-databases
Footprinting for securty auditors
Find vulnerabilities with nmap
•XSS / SQL Injection
↘nmap -p80 –script http-unsafe-output-escaping <target>
↘http://svn.dd-wrt.com/browser/src/router/nmap/scripts/http-un
safe-output-escaping.nse?rev=28293
↘https://nmap.org/nsedoc/scripts/http-unsafe-output-escaping.ht
ml
Footprinting for securty auditors
Security Track
Vulnerability Scanner
Footprinting for securty auditors
Footprinting for securty auditors
Arachni Vulnerability Scanner
Footprinting for securty auditors
Links & References
• http://www.0daysecurity.com/penetration-testing/net
work-footprinting.html
• http://nmap.org/nsedoc/
• https://secwiki.org/w/Nmap/External_Script_Library
• https://nmap.org/book/man-os-detection.html
• https://hackertarget.com/7-nmap-nse-scripts-recon/
Footprinting for securty auditors
Books
Footprinting for securty auditors
Security track
Thank you!
Jose Manuel Ortega
@jmortegac

More Related Content

PDF
penetration testing
PPSX
Security policies
PPTX
Domain 6 - Security Assessment and Testing
PDF
1. Network Security Monitoring Rationale
PPTX
Access control
PPT
Basic Concepts of information security.ppt
PPT
164199724-Introduction-To-Digital-Forensics-ppt.ppt
PPTX
Privacy in simple
penetration testing
Security policies
Domain 6 - Security Assessment and Testing
1. Network Security Monitoring Rationale
Access control
Basic Concepts of information security.ppt
164199724-Introduction-To-Digital-Forensics-ppt.ppt
Privacy in simple

What's hot (20)

PPTX
Threat & Vulnerability Malicious Attacks.pptx
PDF
Access_Control_Systems_and_methodology
PDF
Access Control: Principles and Practice
PPT
Chapter 5 Planning for Security-students.ppt
PPTX
Operating system security
PDF
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
PPTX
Security Policies and Standards
PPTX
Domain 2 - Asset Security
PPTX
The Definitive CASB Business Case Kit - Presentation
PPT
Cyber forensics
PPTX
Network security
PPTX
Introduction to Malware Analysis
PPT
Linux forensics
PDF
Tracking Emails
PPTX
( Ethical hacking tools ) Information grathring
PDF
Cyber Forensics Module 1
PDF
Cyber Space Threats and Opportunities
PPTX
الأمن السيبراني (2).pptx
PPT
Penetration Testing Basics
Threat & Vulnerability Malicious Attacks.pptx
Access_Control_Systems_and_methodology
Access Control: Principles and Practice
Chapter 5 Planning for Security-students.ppt
Operating system security
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
Security Policies and Standards
Domain 2 - Asset Security
The Definitive CASB Business Case Kit - Presentation
Cyber forensics
Network security
Introduction to Malware Analysis
Linux forensics
Tracking Emails
( Ethical hacking tools ) Information grathring
Cyber Forensics Module 1
Cyber Space Threats and Opportunities
الأمن السيبراني (2).pptx
Penetration Testing Basics
Ad

Viewers also liked (20)

PDF
Ethical hacking with Python tools
PDF
Ceh v5 module 02 footprinting
PDF
2 footprinting ve keşif
PDF
Certificaciones tecnológicas
PPTX
Groovy&Grails: desarrollo rápido de aplicaciones
PDF
Inteligencia Colectiva
PDF
Por su seguridad
PDF
Certificaciones Tecnológicas: La acreditación del experto
PDF
Herramientas gestion proyectos
PDF
Seguridad en dispositivos móviles
PDF
Privacidad internet
PDF
PDF
Groovy&Grails: desarrollo rápido de aplicaciones
PDF
Git and git flow
PDF
Manual de uso de la web 2.0
PDF
Continuous Delivery
PDF
Nmap commands
PDF
[NCTU] [CCCA] Network Security I
PDF
Ch 09 -- ARP & IP Analysis
PDF
Working with the AOSP - Linaro Connect Asia 2013
Ethical hacking with Python tools
Ceh v5 module 02 footprinting
2 footprinting ve keşif
Certificaciones tecnológicas
Groovy&Grails: desarrollo rápido de aplicaciones
Inteligencia Colectiva
Por su seguridad
Certificaciones Tecnológicas: La acreditación del experto
Herramientas gestion proyectos
Seguridad en dispositivos móviles
Privacidad internet
Groovy&Grails: desarrollo rápido de aplicaciones
Git and git flow
Manual de uso de la web 2.0
Continuous Delivery
Nmap commands
[NCTU] [CCCA] Network Security I
Ch 09 -- ARP & IP Analysis
Working with the AOSP - Linaro Connect Asia 2013
Ad

Similar to Footprinting tools for security auditors (20)

PPTX
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
PPTX
PPT
Network Scanning Phases and Supporting Tools
PPTX
DC612 Day - Hands on Penetration Testing 101
PDF
Network Situational Awareness with d00gle
PPTX
Ready set hack
PPTX
Network Penetration Testing
PPT
CYBER FORENSICS-scanning and enumuration.ppt
PDF
Nmap basics-1198948509608024-3
PPTX
PPTX
An Toan Thong Tin.pptx
PDF
Penetration Testing Services Technical Description Cyber51
PPTX
Network scan
DOCX
Backtrack Manual Part3
PPTX
Cybersecurity and Ethical Hacking: Capstone Project
PPTX
Intrusion Prevention System
PPT
cyber forensics Footprinting and Scanning.ppt
PPTX
Exploring Kali Linux Tools for Website Scanning via IP Address
PDF
Network Security Tools
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
Network Scanning Phases and Supporting Tools
DC612 Day - Hands on Penetration Testing 101
Network Situational Awareness with d00gle
Ready set hack
Network Penetration Testing
CYBER FORENSICS-scanning and enumuration.ppt
Nmap basics-1198948509608024-3
An Toan Thong Tin.pptx
Penetration Testing Services Technical Description Cyber51
Network scan
Backtrack Manual Part3
Cybersecurity and Ethical Hacking: Capstone Project
Intrusion Prevention System
cyber forensics Footprinting and Scanning.ppt
Exploring Kali Linux Tools for Website Scanning via IP Address
Network Security Tools

More from Jose Manuel Ortega Candel (20)

PDF
Seguridad y auditorías en Modelos grandes del lenguaje (LLM)
PDF
Seguridad y auditorías en Modelos grandes del lenguaje (LLM).pdf
PDF
Beyond the hype: The reality of AI security.pdf
PDF
Seguridad de APIs en Drupal_ herramientas, mejores prácticas y estrategias pa...
PDF
Security and auditing tools in Large Language Models (LLM).pdf
PDF
Herramientas de benchmarks para evaluar el rendimiento en máquinas y aplicaci...
PDF
Asegurando tus APIs Explorando el OWASP Top 10 de Seguridad en APIs.pdf
PDF
PyGoat Analizando la seguridad en aplicaciones Django.pdf
PDF
Ciberseguridad en Blockchain y Smart Contracts: Explorando los Desafíos y Sol...
PDF
Evolution of security strategies in K8s environments- All day devops
PDF
Evolution of security strategies in K8s environments.pdf
PDF
Implementing Observability for Kubernetes.pdf
PDF
Computación distribuida usando Python
PDF
Seguridad en arquitecturas serverless y entornos cloud
PDF
Construyendo arquitecturas zero trust sobre entornos cloud
PDF
Tips and tricks for data science projects with Python
PDF
Sharing secret keys in Docker containers and K8s
PDF
Implementing cert-manager in K8s
PDF
Python para equipos de ciberseguridad(pycones)
PDF
Python para equipos de ciberseguridad
Seguridad y auditorías en Modelos grandes del lenguaje (LLM)
Seguridad y auditorías en Modelos grandes del lenguaje (LLM).pdf
Beyond the hype: The reality of AI security.pdf
Seguridad de APIs en Drupal_ herramientas, mejores prácticas y estrategias pa...
Security and auditing tools in Large Language Models (LLM).pdf
Herramientas de benchmarks para evaluar el rendimiento en máquinas y aplicaci...
Asegurando tus APIs Explorando el OWASP Top 10 de Seguridad en APIs.pdf
PyGoat Analizando la seguridad en aplicaciones Django.pdf
Ciberseguridad en Blockchain y Smart Contracts: Explorando los Desafíos y Sol...
Evolution of security strategies in K8s environments- All day devops
Evolution of security strategies in K8s environments.pdf
Implementing Observability for Kubernetes.pdf
Computación distribuida usando Python
Seguridad en arquitecturas serverless y entornos cloud
Construyendo arquitecturas zero trust sobre entornos cloud
Tips and tricks for data science projects with Python
Sharing secret keys in Docker containers and K8s
Implementing cert-manager in K8s
Python para equipos de ciberseguridad(pycones)
Python para equipos de ciberseguridad

Recently uploaded (20)

PDF
Empathic Computing: Creating Shared Understanding
PDF
Electronic commerce courselecture one. Pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Approach and Philosophy of On baking technology
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPT
Teaching material agriculture food technology
PDF
Encapsulation theory and applications.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
cuic standard and advanced reporting.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Big Data Technologies - Introduction.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Empathic Computing: Creating Shared Understanding
Electronic commerce courselecture one. Pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Chapter 3 Spatial Domain Image Processing.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
NewMind AI Weekly Chronicles - August'25 Week I
The Rise and Fall of 3GPP – Time for a Sabbatical?
Approach and Philosophy of On baking technology
Unlocking AI with Model Context Protocol (MCP)
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Teaching material agriculture food technology
Encapsulation theory and applications.pdf
Review of recent advances in non-invasive hemoglobin estimation
cuic standard and advanced reporting.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Encapsulation_ Review paper, used for researhc scholars
Big Data Technologies - Introduction.pptx
Network Security Unit 5.pdf for BCA BBA.
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...

Footprinting tools for security auditors

  • 1. Footprinting for securty auditors Security track Footprinting for security auditors Jose Manuel Ortega @jmortegac
  • 2. Footprinting for securty auditors Agenda • Information gathering • Footprinting tools • Port scanning with nmap • Nmap scripts
  • 3. Footprinting for securty auditors Security auditing phases Analyze publicly available information. Set scope of attack and identify key targets. Check for vulnerabilities on each target resource Attack targets using library of tools and techniques Footprint Analysis Who is DNS Lookup Search Engines Enumeration Exploitation Buffer Overflows Spoofing Password Rootkit Scanning Machines Ports Applications
  • 4. Footprinting for securty auditors Security Track Information Gathering
  • 5. Footprinting for securty auditors Footprinting (gather target information) ➔ names, addresses, system types, ... Scanning (detect systems and services) ➔ response from network stack, applications, ... Fingerprinting (identify topologies & systems) ➔ network layout, operating systems, services passive passive or active active Enumeration (collect access information) ➔ list of user accounts, share names, … Sniffing (collect network traffic) ➔ addresses, names, information (passwords, ...) Information gathering
  • 6. Footprinting for securty auditors Footprinting • Identify locations, domain names, IP address ranges, e-mail addresses, dial-in phone numbers, systems used, administrator names, network topology. • Using public information. • Without network /physical connection to the target.
  • 7. Footprinting for securty auditors Security Track Tools
  • 8. Footprinting for securty auditors Kali Linux
  • 9. Footprinting for securty auditors Whois Online Tools • Get information about domains, IP address, DNS • Identify the domain names and associated networks related to a particular organization • https://www.whois.net/ • https://tools.whois.net/ • http://www.whois.com/whois • http://who.is • http://toolbar.netcraft.com/site_report • http://whois.domaintools.com/
  • 10. Footprinting for securty auditors Netcraft • http://toolbar.netcraft.com/site_report/?url=fosdem.org
  • 11. Footprinting for securty auditors Whois
  • 12. Footprinting for securty auditors Whois command
  • 13. Footprinting for securty auditors Host command • Ge IPv4,v6,mail server
  • 14. Footprinting for securty auditors Network tools • http://network-tools.com/
  • 15. Footprinting for securty auditors NETWORK Tools • https://www.dnssniffer.com/networktools
  • 17. Footprinting for securty auditors Robtex • Provides graphical information from DNS and Whois • https://www.robtex.com/dns-lookup/fosdem.org
  • 18. Footprinting for securty auditors Robtex
  • 19. Footprinting for securty auditors Nslookup • Query DNS server in order to extract valuable information about the host machine. • Find names of machines through a domain/zone transfer • Nslookup -d→ list all associated records for the domain
  • 20. Footprinting for securty auditors Dig /DNS Resolver
  • 21. Footprinting for securty auditors Dnsmap
  • 22. Footprinting for securty auditors Dnsenum
  • 23. Footprinting for securty auditors DnsRecon
  • 24. Footprinting for securty auditors Zone Transfer • How does one provide security against DNS Interrogation? • Restrict zone transfers to authorized servers. • Set your firewall or router to deny all unauthorized inbound connections to TCP port 53 • Best practice to restrict Zone transfers is review file configuration /etc/bind/named.conf.local
  • 25. Footprinting for securty auditors Zone Transfer
  • 26. Footprinting for securty auditors The harvester • Catalogue email address and subdomains from a specific domain. • It works with all the major search engines including Bing and Google. • The objective is to gather emails, subdomains, hosts, employee names, open ports and banners from different public sources like search engines, PGP key servers and SHODAN computer database.
  • 27. Footprinting for securty auditors The harvester
  • 28. Footprinting for securty auditors The harvester
  • 29. Footprinting for securty auditors Subdomains • https://api.hackertarget.com/hostsearch/?q=fosdem.org
  • 30. Footprinting for securty auditors Maltego
  • 31. Footprinting for securty auditors Maltego ∙ Company Stalker (this gathers email information) ∙ Footprint L1 (basic information gathering) ∙ Footprint L2 (moderate amount of information gathering) ∙ Footprint L3 (intense and the most complete information gathering)
  • 32. Footprinting for securty auditors Maltego
  • 33. Footprinting for securty auditors Shodan
  • 34. Footprinting for securty auditors Censys.io
  • 35. Footprinting for securty auditors Mr looquer
  • 36. Footprinting for securty auditors Web robots • https://wordpress.com/robots.txt • https://wordpress.com/sitemap.xml
  • 37. Footprinting for securty auditors Web Archive
  • 38. Footprinting for securty auditors Spider foot
  • 39. Footprinting for securty auditors Spider foot
  • 40. Footprinting for securty auditors Scanning tools • Active footprinting • Number and type of opened ports • Type of services running in the servers • Vulnerabilities of the services and software • Nmap is a great tool for discovering Open ports, protocol numbers, OS details, firewall details, etc.
  • 41. Footprinting for securty auditors Security Track NMAP
  • 42. Footprinting for securty auditors Nmap Port Scanner • Unix-based port scanner • Support for different scanning techniques • Detects operating system of remote hosts • Many configuration options - timing - scanned port range - scan method • Various front ends for easier handling
  • 43. Footprinting for securty auditors Zenmap Port Scanner
  • 44. Footprinting for securty auditors Zenmap Port Scanner
  • 45. Footprinting for securty auditors Sparta
  • 46. Footprinting for securty auditors Nmap whois
  • 47. Footprinting for securty auditors Guessing the Operating System • We can use the --osscan-guess option to force Nmap into discovering the OS.
  • 48. Footprinting for securty auditors Banner Grabbing nmap -p80 -sV -sT fosdem.org
  • 49. Footprinting for securty auditors Nmap Script Engine • Simple scripts to automate a wide variety of networking tasks • Are written in Lua programming language. • Network discovery • Vulnerability detection • Backdoor detection • Vulnerability exploitation
  • 50. Footprinting for securty auditors Nmap Script Engine usr/local/share/nmap/scripts
  • 51. Footprinting for securty auditors Nmap Script Engine • https://github.com/cldrn/nmap-nse-scripts/tree/master/ scripts
  • 52. Footprinting for securty auditors Banner grabbing with nmap script nmap --script banner fosdem.org
  • 53. Footprinting for securty auditors http-enum script nmap -v --script http-enum.nse fosdem.org
  • 54. Footprinting for securty auditors ↘mysql-databases nmap -v -d -p3306 --script mysql-databases.nse --script-args='mysqluser=root' 192.168.100.8
  • 55. Footprinting for securty auditors ↘mysql-databases
  • 56. Footprinting for securty auditors Find vulnerabilities with nmap •XSS / SQL Injection ↘nmap -p80 –script http-unsafe-output-escaping <target> ↘http://svn.dd-wrt.com/browser/src/router/nmap/scripts/http-un safe-output-escaping.nse?rev=28293 ↘https://nmap.org/nsedoc/scripts/http-unsafe-output-escaping.ht ml
  • 57. Footprinting for securty auditors Security Track Vulnerability Scanner
  • 59. Footprinting for securty auditors Arachni Vulnerability Scanner
  • 60. Footprinting for securty auditors Links & References • http://www.0daysecurity.com/penetration-testing/net work-footprinting.html • http://nmap.org/nsedoc/ • https://secwiki.org/w/Nmap/External_Script_Library • https://nmap.org/book/man-os-detection.html • https://hackertarget.com/7-nmap-nse-scripts-recon/
  • 61. Footprinting for securty auditors Books
  • 62. Footprinting for securty auditors Security track Thank you! Jose Manuel Ortega @jmortegac