CH 01
CH 01
Footprinting
Google Hacking
Find sensitive data about a company from
Google
Completely stealthy—you never send a
single packet to the target (if you view the
cache)
To find passwords:
– intitle:"Index of" passwd passwd.bak
See links Ch 1a, 1b on my Web page
(samsclass.info, click CNIT 124)
Other fun searches
Nessus reports (link Ch 1c)
More passwords (link Ch 1d)
Be The Bot
Internet
Presence
Intranet
Internet
Domain name
Network blocks
Specific IP addresses of systems reachable via
the Internet
TCP and UDP services running on each system
identified
System architecture (for example, Sparc vs. x
86)
Access control mechanisms and related access
control lists (ACLs)
Intrusion-detection systems (IDSs)
System enumeration (user and group names,
system banners, routing tables, and SNMP
information) DNS hostnames
Intranet
Networking protocols in use (for example, IP, IPX,
DecNET, and so on)
Internal domain names
Network blocks
Specific IP addresses of systems reachable via the
intranet
TCP and UDP services running on each system
identified
System architecture (for example, SPARC vs. x 86)
Access control mechanisms and related ACLs
Intrusion-detection systems
System enumeration (user and group names, system
banners, routing tables, and SNMP information)
Remote access
Analog/digital telephone numbers
Remote system type
Authentication mechanisms
VPNs and related protocols (IPSec and
PPTP)
Extranet
Connection origination and destination
Type of connection
Access control mechanism
Internet Footprinting
Step 1: Determine the Scope of Your
Activities
Step 2: Get Proper Authorization
Step 3: Publicly Available Information
Step 4: WHOIS & DNS Enumeration
Step 5: DNS Interrogation
Step 6: Network Reconnaissance
Step 1: Determine the Scope of
Your Activities
Entire organization
Certain locations
Business partner connections (extranets)
Disaster-recovery sites
Step 2: Get Proper Authorization
Ethical Hackers must have authorization in
writing for their activities
– "Get Out of Jail Free"
card
– Criminals omit this step
Image from
www.blackhatseo.fr
Step 3: Publicly Available
Information
Company web pages
– Wget and Teleport Pro are good tools to
mirror Web sites for local analysis (links Ch 1o
& 1p)
– Look for other sites beyond "www"
– Outlook Web Access
https://owa.company.com or
https://outlook.company.com
– Virtual Private Networks
http://vpn.company.com or
http://www.company.com/vpn
Step 3: Publicly Available
Information
Related
Organizations
Physical Address
– Dumpster-diving
– Surveillance
– Social
Engineering
Tool: Google Earth
(link Ch 1q)
Step 3: Publicly Available
Information
Phone Numbers, Contact Names, E-mail
Addresses, and Personal Details
Current Events
– Mergers, scandals, layoffs, etc. create
security holes
Privacy or Security Policies, and Technical
Details Indicating the Types of Security
Mechanisms in Place
Step 3: Publicly Available
Information
Archived Information
– The Wayback Machine (link Ch 1t)
– Google Cache
Disgruntled Employees
Search Engines
– SiteDigger seems to be out of date—I tried to
get it to work with a Google AJAX key but it
doesn't
– Wikto is an alternative that might still work
(link Ch 1u)
Step 3: Publicly Available
Information
Usenet
– Groups.google.com
Resumes
Step 4: WHOIS & DNS
Enumeration
Two organizations manage domain
names, IP addresses, protocols and port
numbers on the Internet
– Internet Assigned Numbers Authority (IANA;
http://www.iana.org)
– Internet Corporation for Assigned Names and
Numbers (ICANN; http://www.icann.org)
– IANA still handles much of the day-to-day
operations, but these will eventually be
transitioned to ICANN
Step 4: WHOIS & DNS Enumeration
Domain-Related Searches
– Every domain name, like msn.com, has a top-
level domain - .com, .net, .org, etc.
If we surf to http://whois.iana.org, we can
search for the authoritative registry for all
of .com
– .com is managed by Verisign
Step 4: WHOIS & DNS Enumeration
Step 4: WHOIS & DNS Enumeration
IP-Related Searches
– To track down an IP address:
Use arin.net (link Ch 1x)
It may refer you to a different database
Examples:
– 147.144.1.1
– 61.0.0.2
Step 4: WHOIS & DNS Enumeration
IP-Related Searches
– Search by company name at arin.net to find IP
ranges, and AS numbers
– AS numbers are used by BGP (Border Gateway
Protocol) to prevent routing loops on Internet routers
(link Ch 1y)
– Examples: Google, CCSF
Step 4: WHOIS & DNS Enumeration