BIA PROJ
BIA PROJ
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material
is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Agenda
Abstract
Reconnaisance
Active reconnaisacne tools and methods
Passve reconnaissance tools and methods
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material
is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Reconnaissance
• Refers to a set of process and techniques such as scanning and enumeration to
covertly gather location and steal as much confidential information as possible.
• Commonly done in ethical hacking and penetration testing.It is the first step in
planning phase of cyber kill chain.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material
is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Tools used in Active Reconnaissance
1. NMAP
• Network mapper is an open source linux command line tool used to scan IP
addresses and ports.
• It finds which devices are running on their network,discover open ports and
services and detect vulnerabilities.
FUNCTIONALITIES AND OUTCOMES
• Quickly map out and recognizes devices in the network using simple commands.
• Identify running services ,vulnerabilities and detailed information regarding the
operating system.
• Can scan multiple port at same time.
• Develop visual mappings of network using Zenmap.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material
is prohibited and subject to legal action under breach of IP and confidentiality clauses.
In the above example we have carried out nmap for youtube.com and we can
see that it has 2 open ports.
Similarly nmap have target specification,host discovery,port specification,OS
detection,service/version detection scans and many more.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material
is prohibited and subject to legal action under breach of IP and confidentiality clauses.
2. Nikto
• Nikto is an open source web server
scanner.
• It performs vulnerability scanning
against web server for dangerous
files and programs.
• Checks for outdated web server
version and server configuration
error.
• Nikto can be used to find SQL
injection,XSS and can even identify
installed softwares.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material
is prohibited and subject to legal action under breach of IP and confidentiality clauses.
3. Metasploit
• Metasploit is a penetration testing framework
that helps in finding and exploiting
vulnerabilities in systems.
• It is also frequently updated with new exploits
published in CVE(Common vulnerability and
exposure)
• Also used as a development platform that allows
to create security tools and exploits.
• In reconnaissance phase metasploit integrates
with tools like Nmap ,SNMP scanning and
nessus to find vulnerabilities.
• Provides clean exist and persistent access to
target system.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material
is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Here nmap is run in
metasploit tool.
Shows the output for
nmap for
scanme.nmap.org
Click to edit
Master title
style
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material
is prohibited and subject to legal action under breach of IP and confidentiality clauses.
• Scans for IP addresses and open ports
• It is a GUI based IP address scanner
• Scan IP address to find live hosts and critical
information about the IP addresses.
• Java is a important requirement.
4.Angry IP Scanner • Network scanner alternative scanner to
Nmap.
• Scan types include UDP scans, TCP scans and
ping scans.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material
is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Here shows the
scan result of
port number 80
ip range from
Click to edit 10.0.2.0 to
Master title 10.0.2.255 and
style display only alive
hosts in angry ip
scanner tool
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material
is prohibited and subject to legal action under breach of IP and confidentiality clauses.
5.OSINT Reconnaissance
• Open source intelligence reconnaissance involves using publicly
available resources to collect information.
• OSINT tools are also used in passive reconnaissance.
• Some of the OSINT tools include:-
• Shodan IO and Censys.io- Search engine that provides reports on devices that
are accessible from internet.
• Reversewhois.io - Locates all domains owned by an individual or companies by
using names or email address for the search
• Dnsdumpster.com - Find hosts related to a domain.
• VirusTotal - Analyzes suspicious files ,URLs and hashes.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material
is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Interface of Shodan.io and Dns dumpster
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material
is prohibited and subject to legal action under breach of IP and confidentiality clauses.
• Interface of VirusTotal and Reverse whois lookup
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material
is prohibited and subject to legal action under breach of IP and confidentiality clauses.
• Social engineering involves directly interacting
with the target in various ways.
• While OSINT uses publicly available
information ,social engineering is more
psychological persuasion of target or people near
6.Social the target company or person.
Engineering • Types of social engineering attacks include:
• Phishing: Imitating as a legitimate source to gain
information.
• Tailgating : “Piggybacking” gaining access while
piggybacking authorized personnel through scams and
false alarms.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material
is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Tools used in Passive Reconnaissance
1. Wireshark
• A network traffic analyzer and packet sniffer.
• In depth information about each packet in your
network. Click to edit
• Filters in wireshark helps in narrowing down
the data,such as capture filter and display filter.
Master title style
• Identify security threat and malicious activity
on a network.
• Export data to XML,CSV files.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material
is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Wireshark
capturing
packets from wifi
network
Click to edit
Master title
style
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material
is prohibited and subject to legal action under breach of IP and confidentiality clauses.
2.Netcraft
• It is a comprehensive tool to
identify phishing or legitimate
sites.
• Scan and identify malicious
websites as well as fraudulent
domains,social media profiles
email and more.
• Generate report for the same .
• Image shows report from
netcraft for website
scanme.nmap.org.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material
is prohibited and subject to legal action under breach of IP and confidentiality clauses.
3. TheHarvester
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material
is prohibited and subject to legal action under breach of IP and confidentiality clauses.
theHarvester
showing result
after searching
for gmail.com in
Click to edit duckduckgo
Master title search engine
style
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material
is prohibited and subject to legal action under breach of IP and confidentiality clauses.
4.Spiderfoot
• SpiderFoot is an open-source
intelligence automation tool
widely used for gathering and
analyzing information about a
target ,domain,IP address or
person.
• Also used offensively as part of
black-box testing .
• Image shows spiderfoot running
a command to scan ip 192.0.2.1.
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material
is prohibited and subject to legal action under breach of IP and confidentiality clauses.
5.Recon-ng
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material
is prohibited and subject to legal action under breach of IP and confidentiality clauses.
4.Maltego
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material
is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Questions ?
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material
is prohibited and subject to legal action under breach of IP and confidentiality clauses.
Thank You!
CONFIDENTIAL: The information in this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this material
is prohibited and subject to legal action under breach of IP and confidentiality clauses.