CEH Module 2
CEH Module 2
CEH Module 2
Value of footprinting:
Gain knowledge of the target’s overall security posture
Create a “bird’s eye” view of the target
Physical/facility vulnerabilities
High-level network map
Potential target areas to attack
Potential human targets to engage
Information that may not seem immediately useful may gain relevance later
Search for anything that might help you gain access to the target’s network:
General company information
Company mission, products, services, activities, location, contact information
Employee information
Email addresses, contact information, job roles
Internet presence
Domain names, website content, online services offered, IP addresses, network reachability
Leaked documents and login information
Use search engine cached pages or Archive.org to see information no longer available
Use OSINT tools to automate information gathering and find hidden information
Collect names, job titles, personal information, contact information, email
addresses, etc.
Remember: at this stage you want to be subtle and go unnoticed
Techniques include:
Casual face-to-face contact
Trade show or public event
Eavesdropping
Shoulder surfing
Dumpster diving
Impersonation on social networking sites
Monitor website content for changes
Set alerts to notify you of updates
Alerts are usually sent via email or SMS
To receive alerts, register on the website
Google Alerts
Yahoo Alerts
Twitter Alerts
Giga Alerts
TOOLS
A search engine that is also a cybersecurity framework
Assembles information from publicly available sources
Includes:
username, email address, contact information, language transition
public records, domain name, IP address, malicious file analysis,
threat intelligence and more
https://osintframework.com/
Cybersecurity framework search engine
Assembles the information from publicly available sources
Cyberspace search engine
Combines several data gathering tools into a full-service online platform
Users can get data directly from Spyse’s web interface or their API
Has free and paid features
An open source intelligence and forensics application
Use to mine, gather and visualize data and relationships in an easy-to-understand
format
Find relationships and links between people, groups, companies, organizations,
websites, Internet infrastructure, phrases, documents, files, etc.
Used by law enforcement to analyze social media accounts
Track profiles, understand social networks of influence, interests and groups
During the COVID-19 crisis Maltego was used to aid virus containment efforts:
• Scientific study of the virus spread
• Trace tourist/visitor movement from coronavirus hotspots to other locations
Shodan.io
Search engine for Internet-connected devices
Most commonly used to help users identify potential security issues with their
devices
Can find anything that connects directly to the internet:
Routers and servers
Baby monitors
Security cameras
Maritime satellites
Water treatment facilities
Traffic light systems
Prison pay phones
Nuclear power plants
Similar to Shodan
Continually discovers Internet-
facing assets including IoT
devices
Offers cloud-based dashboard
OSINT tool for gathering:
emails, sub-domains, hosts, employee names, open ports, and banners from different
public sources like search engines, PGP key servers, and SHODAN computer database
Written in Python
Many of its functions require an API key to effectively query the source
theHarvester -d www.hackthissite.org -n -b google
Written in Python
Alternatively has a cloud-hosted version
Different subscription levels
A set of libraries for performing Open Source Intelligence tasks
Has various scripts and applications for:
Username checking
DNS lookups
Information leaks research
Deep web search
Regular expressions extraction
etc.
Useful information might reside in PDF or Office files
Use this hidden metadata to perform social engineering
Tools:
Metagoofil
ExtractMetadata
FOCA
Meta Tag Analyzer
BuzzStream
Analyze Metadata
Exiftool
Extracts metadata from publicly available documents belonging to a target
company
pdf, doc, xls, ppt, docx, pptx, xlsx
SEARCH
The use of specialized Google searches
Find unusual information such as:
Sites that may link back to target’s website
Information about partners, vendors, suppliers, clients, etc.
Error messages that contain sensitive information
Files that contain passwords
Sensitive directories
Pages that contain hidden login portals
Advisories and server vulnerabilities
Software version information
Web app source code
Using search strings with advanced operators
Find information not readily available on a website
Can be used to find vulnerabilities, files containing passwords,
lists of emails, log files, live camera feeds, and much more
Considered an easy way of hacking
Operator Description Example
intitle: find strings in the title of a page intitle:”Your Text”
allintext: find all terms in the title of a page allintext:”Contact”
inurl: find strings in the URL of a page inurl:”news.php?id=”
https://www.exploit-db.com/google-hacking-database/
2.4 WHOIS
Internet Authorities
Whois
* Every major network that is part of the Internet has an identifying Autonomous System number
Governing bodies that responsible for controlling all IP addresses and domain
registrations in their operating region
American Registry for Internet Numbers (ARIN)
U.S., Canada, Antarctica and parts of the Caribbean region
African Network Information Center (AfriNIC) - Africa and the Indian Ocean
Reseaux IP Europeens Network Coordination Centre (RIPE NCC)
Europe, Russia, Central Asia, Middle East
Source: domainnamestat.com
There is no single Whois database
Registrars and registries each maintain their own respective Whois database
Registrars – companies and organizations that have ICANN accreditation and are registry
certified to sell domain names
Also responsible for any resellers under them
Registries – organizations responsible for maintaining the records of a specific top level
domain (TLD) such as .com, .net, .org, etc.
ICANN requires that records remain accurate for the life of the domain registration
WHOIS databases are maintained by Regional Internet Registries and hold personal
information of domain owners
WHOIS query
Domain name and details
Owner information
DNS servers
Network Blocks
Autonomous System Numbers
When created
Expiry
Last update
Server: 192.168.63.2
Address: 192.168.63.2#53
Non-authoritative answer:
Name: www.hackthissite.org
Address: 137.74.187.103
Name: www.hackthissite.org
Address: 137.74.187.102
dig www.example.com
dig @8.8.8.8 www.example.com A
dig +short www.example.com A
dig example.com txt
dig example.com cname
dig example.com ns
dig example.com MX
dig axfr zonetransfer.me @nsztm1.digi.ninja.
Find subdomains for a domain
Install in Kali:
apt install sublist3r
Sublist3r -d <domain>
2.6 WEBSITE
Tools
Spiders
FOOTPRINTING Mirroring
Update Monitoring
Monitoring and analyzing the target’s website for information
Browse the target website
Use Burp Suite, Zaproxy, Paros Proxy, Website Informer, Firebug, etc. to determine:
Connection status and content-type
Accept-Ranges and Last-Modified information
X-Powered-By information
Web server version
BlackWidow
• WebWatcher
Ncollector Studio
Allows access to archived versions of the website
Copies the site as it was at the time
You can find information that was subsequently deleted
Archived sites may or may not include original downloads
Also reveals:
Spoofed info
Bogus links and phishing techniques
Tracking emails can reveal:
Recipient IP address
Geolocation
Email received and read
Read duration
Proxy detection
Links
OS and Browser info
Forwarded email
Recipient device type
EmailTrackerPro • Trace Email
PoliteMail • Email Lookup
Yesware • Pointofmail
ContactMonkey • WhoReadMe
Zendio • GetNotigy
ReadNotify
• G-Lock Analytics
DidTheyReadit
2.8 Network Range
$ whois 185.199.109.153
THROUGH Information
People Search
SOCIAL Social Media Groups
NETWORKING
SITES
Attackers use social networking sites to gain important and sensitive data about
their target
They often create fake profiles through these social media
Aim is to lure their target and extract vulnerable information
Date of birth
Photos and social networking profiles
Friends/family/associates
Hobbies/current activities/blogs
Work information
Projects and operating environment
Travel details
CheckPeople
BeenVerified
Truthfinder
peopleWhiz
PeopleLooker
Intelius
Checkmate
Peoplefinders
IDtrue
Social Media groups, forums, and blogs provide more intimate information about a
person
Current interests
Current activities
Hobbies
Political and social viewpoints
RECONNAISSANCE
COUNTER-
MEASURES
Recognize that once information is on the Internet, it might never fully disappear
Perform OSINT on yourself regularly to see what’s out there
Identify information that might be harmful
When possible, go to the sites that publish that information and remove it
Delete/deactivate unnecessary social media profiles
Use an identity protection service
Use Shodan and Google Dorks to search for exposed files and devices
If any are discovered, implement protective measures
Set up a monitoring service such as Google Alerts to notify you if new information
appears
Train yourself (and your employees) to recognize the danger and be cautious
about what they share on social media
If possible, use a data protection solution to minimize data leakage from the
company
Turn off tracking features on your phone and configure privacy settings
Disable location on photos you plan to post publicly on social media
Remove metadata from images if you don’t want others to know which device you
are using to capture
Conduct only private dialogues, trying to avoid public communication on forums
and other sites
Keep a close eye on which web pages and portals you visit
Some of them may require too much information for registration: name, phone
number, real address
Use different nicknames on the Internet – it will be much more difficult to find you
Switch your profile to private mode, if the social network allows you to do this
When adding friends on social media, only add people you actually know in real
life
2.11
FOOTPRINTING
AND Review
RECONNAISSANCE
REVIEW
INTRO TO
• Footprinting gathers as much information as possible about a target in advance of
• ETHICAL
the attack
You’re looking for any information that can help you break into the target network
HACKING
• Footprinting can be passive or active
• It’s usually subtle / unnoticeable
•
REVIEW
Small, random, seemingly unimportant details can together paint a bigger picture
or become important later in your hacking efforts
REVIEW
• Google cache and archive.org that maintain snapshots of websites
over time
INTRO TO
ETHICAL
• You can examine email headers and use email tracking tools to identify the actual
source of an email
•
HACKING
You can use Whois, traceroute, and other tools to identify IP blocks, the firewall IP
address, and other network-available points of entry to the target
•
REVIEW
Social networking sites and social media can provide a wealth of information
INTRO TO
ETHICAL
HACKING
REVIEW