CEH Module 2

Download as pdf or txt
Download as pdf or txt
You are on page 1of 104

 Footprinting

2.1  Types of Information

FOOTPRINTING  Information Sources


 Passive Footprinting/OSINT
CONCEPTS  Active Footprinting
 Footprinting is the first step in reconnaissance
 The attacker looks for tracks and traces the target leaves about itself on the Internet
 Collect as much information as possible

 Value of footprinting:
 Gain knowledge of the target’s overall security posture
 Create a “bird’s eye” view of the target
 Physical/facility vulnerabilities
 High-level network map
 Potential target areas to attack
 Potential human targets to engage
 Information that may not seem immediately useful may gain relevance later
Search for anything that might help you gain access to the target’s network:
 General company information
 Company mission, products, services, activities, location, contact information

 Employee information
 Email addresses, contact information, job roles

 Internet presence
 Domain names, website content, online services offered, IP addresses, network reachability
 Leaked documents and login information

 Overall security posture


 Technologies used
 Industry and market information
 Company profile, assets, financial information, competitors
 Company website(s)
 Whois
 Search engines
 People searches
 Job boards
 Social networking / social media
 News articles and press releases
 Specialized OSINT tools
 Open Source Intelligence
 Use the Internet/publicly available sources to gather information on a target
 Do not directly engage target
 Engage the target in seemingly innocuous ways
 Use “normal” expected actions
 Avoid arousing suspicion

 Interact with the target’s public-facing servers


 Query the organization’s DNS server
 Traceroute to the target network
 Spider / mirror the target’s website
 Extract published document metadata

 Limited social engineering


 Gather business cards
 Chat with company representatives at trade shows and public events
 If your target has a website, visit it for initial information
 Use search engines to obtain additional information about the target including news
and press releases
 Google, Yahoo, Bing, Ask, Baidu, DuckDuckGo, AOL Search

 Use search engine cached pages or Archive.org to see information no longer available
 Use OSINT tools to automate information gathering and find hidden information
 Collect names, job titles, personal information, contact information, email
addresses, etc.
 Remember: at this stage you want to be subtle and go unnoticed
 Techniques include:
 Casual face-to-face contact
 Trade show or public event
 Eavesdropping
 Shoulder surfing
 Dumpster diving
 Impersonation on social networking sites
 Monitor website content for changes
 Set alerts to notify you of updates
 Alerts are usually sent via email or SMS
 To receive alerts, register on the website
 Google Alerts
 Yahoo Alerts
 Twitter Alerts
 Giga Alerts

 Some OSINT tools also offer monitoring and alerts


 Analyze gathered information to determine your next moves
 Get a sense of the target’s overall security posture
 Look for information that can be used in your next steps
 Devices that can get you into the network:
 IP addresses to scan
 Servers and services to vulnerability scan
 Internet-attached IoT devices to compromise

 People to social engineer


 Email addresses to phish
 Phone numbers to call for impersonation
 Names and job roles to target

 Locations for physical reconnaissance


 Parking areas to scatter malicious USB sticks
 Easily accessible areas to plant sniffing/snooping devices
 Detect Wi-Fi signals
2.2 OSINT  Common Tools

TOOLS
 A search engine that is also a cybersecurity framework
 Assembles information from publicly available sources
 Includes:
 username, email address, contact information, language transition
 public records, domain name, IP address, malicious file analysis,
 threat intelligence and more

https://osintframework.com/
 Cybersecurity framework search engine
 Assembles the information from publicly available sources
 Cyberspace search engine
 Combines several data gathering tools into a full-service online platform
 Users can get data directly from Spyse’s web interface or their API
 Has free and paid features
 An open source intelligence and forensics application
 Use to mine, gather and visualize data and relationships in an easy-to-understand
format
 Find relationships and links between people, groups, companies, organizations,
websites, Internet infrastructure, phrases, documents, files, etc.
 Used by law enforcement to analyze social media accounts
 Track profiles, understand social networks of influence, interests and groups

During the COVID-19 crisis Maltego was used to aid virus containment efforts:
• Scientific study of the virus spread
• Trace tourist/visitor movement from coronavirus hotspots to other locations
 Shodan.io
 Search engine for Internet-connected devices
 Most commonly used to help users identify potential security issues with their
devices
 Can find anything that connects directly to the internet:
 Routers and servers
 Baby monitors
 Security cameras
 Maritime satellites
 Water treatment facilities
 Traffic light systems
 Prison pay phones
 Nuclear power plants
 Similar to Shodan
 Continually discovers Internet-
facing assets including IoT
devices
 Offers cloud-based dashboard
 OSINT tool for gathering:
 emails, sub-domains, hosts, employee names, open ports, and banners from different
public sources like search engines, PGP key servers, and SHODAN computer database
 Written in Python
 Many of its functions require an API key to effectively query the source
theHarvester -d www.hackthissite.org -n -b google

[*] Emails found: 2


----------------------
ab790c1315@www.hackthissite.org
staff@hackthissite.org

[*] Hosts found: 7


---------------------
0.loadbalancer.www.hackthissite.org:
22www.hackthissite.org:
2522www.hackthissite.org:
253dwww.hackthissite.org:
www.hackthissite.org:137.74.187.104, 137.74.187.100, 137.74.187.101, 137.74.187.103, 137.74.187.102
x22www.hackthissite.org:
 Uses OSINT and a variety of search engines to enumerate website subdomains
 Can conduct port scans against discovered websites

Subdomains are sometimes preferred targets for attackers:


• Often separately managed by the smaller child organization
• Frequently less secure than the parent domain
• Child organizations are typically smaller with fewer resources than the parent
 Full-featured web reconnaissance framework
 Has many modules with specific functions for conducting OSINT
 Written in Python
 Requires API keys from targets to be effective
 Gathers information from LinkedIn
 Install in Kali Linux:
apt install inspy
Search LinkedIn for Google employees using the provided wordlist of possible job titles:
inspy --empspy /usr/share/inspy/wordlists/title-list-
large.txt Google
Search for technologies (–techspy) in use at the target company (cisco) using the
provided list of terms:
inspy --techspy /usr/share/inspy/wordlists/tech-list-
small.txt cisco
 Follow a target’s Instagram likes and
comments
 OSINT automation tool
 Including target monitoring

 Written in Python
 Alternatively has a cloud-hosted version
 Different subscription levels
 A set of libraries for performing Open Source Intelligence tasks
 Has various scripts and applications for:
 Username checking
 DNS lookups
 Information leaks research
 Deep web search
 Regular expressions extraction
 etc.
 Useful information might reside in PDF or Office files
 Use this hidden metadata to perform social engineering
 Tools:
 Metagoofil
 ExtractMetadata
 FOCA
 Meta Tag Analyzer
 BuzzStream
 Analyze Metadata
 Exiftool
 Extracts metadata from publicly available documents belonging to a target
company
 pdf, doc, xls, ppt, docx, pptx, xlsx

 Uses Google hacks to find information in meta tags


 Generates a report of:
 usernames, email addresses, software versions, server names, etc.
2.3
ADVANCED
 Google Hacking
 Google Dorking

GOOGLE  Google Hacking Database

SEARCH
 The use of specialized Google searches
 Find unusual information such as:
 Sites that may link back to target’s website
 Information about partners, vendors, suppliers, clients, etc.
 Error messages that contain sensitive information
 Files that contain passwords
 Sensitive directories
 Pages that contain hidden login portals
 Advisories and server vulnerabilities
 Software version information
 Web app source code
 Using search strings with advanced operators
 Find information not readily available on a website
 Can be used to find vulnerabilities, files containing passwords,
lists of emails, log files, live camera feeds, and much more
 Considered an easy way of hacking
Operator Description Example
intitle: find strings in the title of a page intitle:”Your Text”
allintext: find all terms in the title of a page allintext:”Contact”
inurl: find strings in the URL of a page inurl:”news.php?id=”

site: restrict a search to a particular site or domain site:yeahhub.com “Keyword”

find specific types of files (doc, pdf, mp3 etc) based on


filetype: filetype:pdf “Cryptography”
file extension
link: search for all links to a site or URL link:”example.com”
cache: display Google’s cached copy of a page cache:yeahhub.com

info: display summary information about a page info:www.example.com


Operator Description Example
OR Match at least one keyword google OR bing OR duckduckgo
AND Match all keywords Samsung AND Apple
““ Exact match "Google Dorks Explained"

- Exclude a keyword Linux -site:Wikipedia.org

* Wildcard of one or more words "username * password"

"google (dorks OR dorking OR hacking)" AND


() Grouping keywords
(explained OR tutorial OR guide)
 Camera feeds – live feeds from AXIS cameras
 intitle:"Live View / - AXIS" | inurl:/mjpg/video.mjpg?timestamp

 Email lists contained in Excel files


 filetype:xls inurl:"email.xls"

 Log files containing passwords and corresponding emails


 filetype:log intext:password intext:(@gmail.com | @yahoo.com |
@hotmail.com)

 Open FTP Servers that can contain sensitive information


 intext:"index of" inurl:ftp
 Return results that match “accounting” from target.com, but NOT from
marketing.target.com
 site:target.com -site:marketing.target.com accounting

 Pages vulnerable to SQL injection attacks


 inurl:".php?id=" intext:(error AND sql)

 Scanning reports – vulnerabilities in scanned systems


 intitle:report (nessus | qualys) filetype:pdf

 SQL Database – contents of exposed databases, including usernames


and passwords
 intitle:"index of" "dump.sql"
 List of popular Google Dorks

https://www.exploit-db.com/google-hacking-database/
2.4 WHOIS
 Internet Authorities
 Whois

FOOTPRINTING  Whois Tools


Organization Description
Internet Corporation for Assigned • A not-for-profit public-benefit corporation
Names and Numbers (ICANN) • Dedicated to keeping the Internet secure, stable and
interoperable
• Promotes competition and develops policy on the
Internet's unique identifiers
• DNS names and Autonomous System (AS) numbers*
The Internet Assigned Numbers • A department within ICANN
Authority (IANA) • Maintains a central repository for Internet standards
• Verifies and updates changes to Top Level Domain (TLD)
information
• Distributes Internet numbers to regions for Internet use
The Internet Engineering Task • An open standards organization
Force (IETF) • They develop and promote voluntary Internet standards
(especially those related to IP)

* Every major network that is part of the Internet has an identifying Autonomous System number
 Governing bodies that responsible for controlling all IP addresses and domain
registrations in their operating region
 American Registry for Internet Numbers (ARIN)
 U.S., Canada, Antarctica and parts of the Caribbean region

 Asia-Pacific Network Information Centre (APNIC)


 Asia, Australia, New Zealand

 African Network Information Center (AfriNIC) - Africa and the Indian Ocean
 Reseaux IP Europeens Network Coordination Centre (RIPE NCC)
 Europe, Russia, Central Asia, Middle East

 Latin America and Caribbean Network Information Center (LACNIC)


 Latin America and parts of the Caribbean
 A widely-used query and response protocol
 Used to query databases that store the registered users or assignees of an Internet
resource such as:
 Domain names
 IP address blocks
 Autonomous system numbers

 The protocol stores and delivers database content in a human-readable format


 It is widely available for publicly available for use

Source: domainnamestat.com
 There is no single Whois database
 Registrars and registries each maintain their own respective Whois database
 Registrars – companies and organizations that have ICANN accreditation and are registry
certified to sell domain names
 Also responsible for any resellers under them
 Registries – organizations responsible for maintaining the records of a specific top level
domain (TLD) such as .com, .net, .org, etc.
 ICANN requires that records remain accurate for the life of the domain registration
 WHOIS databases are maintained by Regional Internet Registries and hold personal
information of domain owners
 WHOIS query
 Domain name and details
 Owner information
 DNS servers
 Network Blocks
 Autonomous System Numbers
 When created
 Expiry
 Last update

 Can aid attacker or ethical hacker with social engineering


 whois.com • UltraTools
 Domainnamestat.com • SoftFuse Whois
 LanWhoIs • Domain Dossier
 Batch IP Converter • BetterWhois
 CallerIP • Whois Online
 WhoIs Lookup Multiple Addresses • Web Wiz

 WhoIs Analyzer Pro


• Network-Tools.com
• DNSstuff
 HotWhoIs
• Network Solutions Whois
 ActiveWhoIs
• WebToolHub
 WhoisThisDomain
2.5 DNS
 DNS Information
 DNS Query Tools

FOOTPRINTING  Location Search Tools


 Attackers use DNS data to find key hosts on the target’s network
 DNS record types:
 A – IPv4 host address
 AAAA - IPv6 host address
 MX – mail server
 NS – name server
 CNAME – alias
 SOA – authority for domain
 SRV – service records
 PTR – maps IP Address to hostname
 RP – responsible person
 HINFO – Host information record (CPU type/OS)
 TXT – Unstructured text record
 Nslookup  DNS Records
 dig  DNSData View
 host  DNSWatch
 whatsmydns.net  DomainTools
 myDNSTools  DNS Query Utility
 Professional Toolset  DNS Lookup
nslookup www.hackthissite.org

Server: 192.168.63.2
Address: 192.168.63.2#53

Non-authoritative answer:
Name: www.hackthissite.org
Address: 137.74.187.103
Name: www.hackthissite.org
Address: 137.74.187.102
dig www.example.com
dig @8.8.8.8 www.example.com A
dig +short www.example.com A
dig example.com txt
dig example.com cname
dig example.com ns
dig example.com MX
dig axfr zonetransfer.me @nsztm1.digi.ninja.
 Find subdomains for a domain
 Install in Kali:
apt install sublist3r
Sublist3r -d <domain>

• Subdomains are useful to investigate


• They are often independently
managed by the local business unit
or child organization
• They typically have fewer resources
(and thus fewer security controls)
than the parent organization
Helps you perform physical or aerial reconnaissance of a target
 Google Maps
 Google Earth
 Wikimapia
 National Geographic Maps
 Yahoo Maps
 Bing Maps
 Website Footprinting

2.6 WEBSITE
 Tools
 Spiders

FOOTPRINTING  Mirroring
 Update Monitoring
 Monitoring and analyzing the target’s website for information
 Browse the target website

 Use Burp Suite, Zaproxy, Paros Proxy, Website Informer, Firebug, etc. to determine:
 Connection status and content-type
 Accept-Ranges and Last-Modified information
 X-Powered-By information
 Web server version

 Examine HTML sources


 Examining cookies
 Use OSINT to discover additional information about a website
 Identify personnel, hostnames, domain names, and useful data residing on exposed
web servers
 Search Google, Netcraft, Shodan, LinkedIn, PGP key servers, and other sites
 Search known domain names and IP blocks
 Searches Google’s cache
 Looks for vulnerabilities, errors, configuration issues, proprietary information, and
interesting security nuggets on web sites
 Use it to find information that can be exposed through Google Dorking
 Web spiders automate searches on the target website and collect information:
 employee names, titles, addresses, email, phone and fax numbers, meta tags

 Helps with footprinting and social engineering attacks


 Tools
 SpiderFoot
 Visual SEO Studio
 WildShark SEO Spider Tool
 Beam Us Up SEO Spider SEO
 Scrapy
 Screaming Frog
 Xenu
 Web content scanner
 Looks for existing and hidden
web objects
 Useful for finding hidden
subdirectories in a web app
 Works by launching a dictionary
based attack against a web
server
 Analyzes the response
 Similar to DIRB
 GUI-based
 Download an entire copy of the website to a local directory
 You can examine the entire website offline
 Helps gather information without making website requests that could be detected
 You can take your time searching
 Need to copy slowly
 HTTrack Web Site Copier • Website Ripper Copier
 SurfOffline • PageNest
 Teleport Pro • Backstreet Browser
 Portable Offline Browser • Offline Explorer Enterprise
 Gnu Wget • Archive.org

 BlackWidow
• WebWatcher

 Ncollector Studio
 Allows access to archived versions of the website
 Copies the site as it was at the time
 You can find information that was subsequently deleted
 Archived sites may or may not include original downloads

 Also contains extensive content uploaded by the community


 Automatically checks web pages for updates and changes
 Sends alerts to interested users
 Example tools:
 Website Watcher
 Visual Ping
 Follow that Page
 Watch that Page
 Check4Change
 OnWebChange
 Infominder
2.7 EMAIL
 Email Source Header
 Email Tracking

FOOTPRINTING  Email Tracking Tools


 Reading the email source header can reveal:
 Address from which the message was sent
 Sender’s mail server
 Authentication system used by sender’s mail server
 Date and time of message
 Sender’s name

 Also reveals:
 Spoofed info
 Bogus links and phishing techniques
Tracking emails can reveal:

 Recipient IP address
 Geolocation
 Email received and read
 Read duration
 Proxy detection
 Links
 OS and Browser info
 Forwarded email
 Recipient device type
 EmailTrackerPro • Trace Email
 PoliteMail • Email Lookup
 Yesware • Pointofmail
 ContactMonkey • WhoReadMe
 Zendio • GetNotigy

 ReadNotify
• G-Lock Analytics

 DidTheyReadit
2.8  Network Range

NETWORK  Network Whois


 Traceroute
FOOTPRINTING
 Map the target network
 Find in RIR whois database search
 Search online:
 https://centralops.net/co/domaindossier.aspx
 https://networksdb.io/ip-addresses-of/

 Use command prompt tools:


 whois
 curl
$ host -t a github.io
github.io has address 185.199.109.153

$ whois 185.199.109.153

inetnum: 185.199.108.0 - 185.199.111.255


netname: US-GITHUB-20170413
country: US

$ curl -s https://networksdb.io/ip-addresses-of/github-inc | grep 'IP


Range' | awk '{print $3" - "$5}' | sort
140.82.112.0 - 140.82.127.255
148.62.46.150 - 148.62.46.151
 Discover routers and firewalls along the path to a target
 Uses ICMP or UDP with an increasing TTL to elicit router identification
 Find the IP address of the target firewall
 Help map the target network
 https://www.monitis.com/traceroute/
 https://centralops.net/co/
 Path Analyzer Pro
 VisualRoute
 Network Pinger
 GEOSpider
 vTrace
 Trout
 Roadkil’s Trace Route
 Magic NetTrace
 3D Traceroute
 AnalogX HyperTrace
 Network Systems Traceroute
 Ping Plotter
2.9
FOOTPRINTING  Social Networking Sites

THROUGH  Information
 People Search
SOCIAL  Social Media Groups

NETWORKING
SITES
 Attackers use social networking sites to gain important and sensitive data about
their target
 They often create fake profiles through these social media
 Aim is to lure their target and extract vulnerable information

 Employees may post :


 Personal information such as DOB, educational and employment background, spouse’s
names, etc.
 Information about their company such as potential clients and business partners, trade
secrets of business, websites, company’s upcoming news, mergers, acquisitions, etc.
 Common social networking sites used:
 Facebook, MySpace, LinkedIn, Twitter, Pinterest, Google+, YouTube, Instagram
 Present activity/physical location
 Job activities
 Company information
 Contact details, names, numbers, addresses, date of birth, photos
 Family & friends
 Property information
 Bank details
 Background and criminal checks
 A great source of personal and organizational information
 Residential addresses, email addresses, phone number
 Satellite photos of residences

 Date of birth
 Photos and social networking profiles
 Friends/family/associates
 Hobbies/current activities/blogs
 Work information
 Projects and operating environment
 Travel details
 CheckPeople
 BeenVerified
 Truthfinder
 peopleWhiz
 PeopleLooker
 Intelius
 Checkmate
 Peoplefinders
 IDtrue
 Social Media groups, forums, and blogs provide more intimate information about a
person
 Current interests
 Current activities
 Hobbies
 Political and social viewpoints

 Can be used to cultivate a relationship with the target


 Attackers create fictious profiles and attempt to join groups
 Disinformation campaigns use bots to:
 Automate posting
 Increase visibility of an issue
 Give malicious information traction
 Make an opinion or idea seem to be popular
2.10
FOOTPRINTING
AND  Mitigation and protection methods

RECONNAISSANCE
COUNTER-
MEASURES
 Recognize that once information is on the Internet, it might never fully disappear
 Perform OSINT on yourself regularly to see what’s out there
 Identify information that might be harmful
 When possible, go to the sites that publish that information and remove it
 Delete/deactivate unnecessary social media profiles
 Use an identity protection service
 Use Shodan and Google Dorks to search for exposed files and devices
 If any are discovered, implement protective measures
 Set up a monitoring service such as Google Alerts to notify you if new information
appears
 Train yourself (and your employees) to recognize the danger and be cautious
about what they share on social media
 If possible, use a data protection solution to minimize data leakage from the
company
 Turn off tracking features on your phone and configure privacy settings
 Disable location on photos you plan to post publicly on social media
 Remove metadata from images if you don’t want others to know which device you
are using to capture
 Conduct only private dialogues, trying to avoid public communication on forums
and other sites
 Keep a close eye on which web pages and portals you visit
 Some of them may require too much information for registration: name, phone
number, real address
 Use different nicknames on the Internet – it will be much more difficult to find you
 Switch your profile to private mode, if the social network allows you to do this
 When adding friends on social media, only add people you actually know in real
life
2.11
FOOTPRINTING
AND  Review

RECONNAISSANCE
REVIEW
INTRO TO
• Footprinting gathers as much information as possible about a target in advance of

• ETHICAL
the attack
You’re looking for any information that can help you break into the target network

HACKING
• Footprinting can be passive or active
• It’s usually subtle / unnoticeable

REVIEW
Small, random, seemingly unimportant details can together paint a bigger picture
or become important later in your hacking efforts

• Research sources can include:


• INTRO TO
Search engines • Press releases


Whois
Websites ETHICAL •

Advanced online services
DNS


HACKING
Social media
Social networking sites


Email
Competitive intelligence sites

REVIEW
Job boards • Limited social engineering
INTRO TO
• OSINT is the use of publicly available sources and tools to footprint a target
• ETHICAL
You can perform advanced Google searches using “dorks” (search strings with
advanced operators)
• TheHACKING
Google Hacking Database (GHDB) lists popular dorks created by the community


REVIEW
Whois is a protocol for searching domain registration information
You can use dig, nslookup, and many other tools to query a DNS server for host
information


INTRO TO
You can footprint websites through the use of:
Spiders that automatically crawl through a website looking for
specific types of information
• ETHICAL
Site mirroring so you can take your time examining an offline copy
of the website

HACKING
Tools like dirb and DirBuster that attempt to uncover hidden
subdirectories on a website

REVIEW
• Google cache and archive.org that maintain snapshots of websites
over time
INTRO TO
ETHICAL
• You can examine email headers and use email tracking tools to identify the actual
source of an email

HACKING
You can use Whois, traceroute, and other tools to identify IP blocks, the firewall IP
address, and other network-available points of entry to the target

REVIEW
Social networking sites and social media can provide a wealth of information

INTRO TO
ETHICAL
HACKING
REVIEW

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy