ch 2

MODULE 02: FOOTPRINTING AND RECONNAISSANCE


Learning Objectives

  • LO#01: Explain Footprinting Concepts

  • LO#02: Demonstrate Footprinting through Search Engines

  • LO#03: Demonstrate Footprinting through Web Services

  • LO#04: Demonstrate Footprinting through Social Networking Sites

  • LO#05: Use Different Techniques for Website Footprinting

  • LO#06: Use Different Techniques for Email Footprinting

  • LO#07: Use Different Techniques for Whois Footprinting

  • LO#08: Use Different Techniques for DNS Footprinting

  • LO#09: Use Different Techniques for Network Footprinting

  • LO#10: Demonstrate Footprinting through Social Engineering

  • LO#11: Use Various Footprinting Tools

  • LO#12: Explain Footprinting Countermeasures


LO#01: Explain Footprinting Concepts

What is Footprinting?
  • Definition: Footprinting is the initial phase in an attack on information systems where an attacker collects information about a target network to find various ways to intrude into the system.

Types of Footprinting
  • Passive Footprinting:

    • Involves gathering information about the target without direct interaction.

  • Active Footprinting:

    • Involves gathering information about the target with direct interaction.

Information Obtained in Footprinting
  • Organization Information:

    • Employee details, branch and location details, organizational background, telephone numbers, web technologies used, news articles, press releases, and related documents.

  • Network Information:

    • Domain and sub-domains, network blocks, network topology, trusted routers, firewalls, reachable system IP addresses, Whois records, and DNS records.

  • System Information:

    • Information about webb servers, their OS, web server locations, publicly available email addresses, usernames, and passwords.


Footprinting Methodology

1. Footprinting Techniques
  • Through Search Engines:

    • Utilizes major search engines like Google, Bing, Yahoo!, etc., to extract technological platforms, employee details, login pages, etc.

  • Through Web Services:

    • Tools are used to gather information from various web services.

  • Through Social Networking Sites:

    • Examples include analyzing social network graphs, using people search services, and monitoring alerts/online reputation.

  • Email Footprinting:

    • Involves tracking email communication and analyzing email headers to uncover sensitive information.

  • Whois and DNS Footprinting:

    • Gathering information from Whois databases and DNS records.

  • Network Footprinting:

    • Techniques include IP geolocation lookup, traceroute, and eavesdropping, among others.


LO#02: Demonstrate Footprinting through Search Engines

Footprinting through Search Engines
  • Attackers utilize search engines to extract specific information about targets, such as technologies used, employee details, and sensitive files.

Major Search Engines:
  • Examples: Google, Bing, Yahoo!, Ask, AOL, Baidu, DuckDuckGo.

Advanced Search Operators in Google Hacking
  • Purpose: Create complex queries to extract sensitive information.

  • Common Operators:

    • [cache:]: Displays cached web pages.

    • [allintitle:]: Returns pages with specific keywords in the title.

    • [link:]: Lists web pages linking to a specified page.

    • [site:]: Restricts results to particular domains.


LO#03: Demonstrate Footprinting through Web Services

Finding a Company's TLDs and Sub-domains
  • Utilize search engines to identify a target company's URL and sub-domains.

  • Tools such as Sublist3r can automate the enumeration of sub-domains.


LO#04: Demonstrate Footprinting through Social Networking Sites

Information Gathering
  • Social networks can reveal various information useful for social engineering attacks, such as contacts, emails, and employment history.

  • Online services like Spokeo, Intelius, and LinkedIn enumeration tools (e.g., theHarvester) can assist in this process.


LO#05: Use Different Techniques for Website Footprinting

Website Footprinting Overview
  • Monitors and analyzes target organization's website to gather information such as software versions and contact details.

Techniques include:
  • Examining HTML Source: For comments, contact details, and file paths.

  • Analyzing Cookies: To identify behaviors and technologies used.

  • Using Web Spiders: Automated tools to collect specified information from the target's website.


LO#06: Use Different Techniques for Email Footprinting

Tracking Email Communications
  • Purpose: Monitor delivery of emails to extract information about recipients (e.g., IP addresses, geolocation).

Analyzing Email Headers:
  • Attackers collect detailed information, including sender’s identity, mail servers, and timestamps to build strategies for attacks.


LO#07: Use Different Techniques for Whois Footprinting

Whois Lookup Description
  • Whois databases maintain the personal information of domain owners.

  • Information obtained includes domain registration details, contact data, and historical data about domains.


LO#08: Use Different Techniques for DNS Footprinting

DNS Information Extraction
  • Purpose: DNS records shed light on server types and locations.

  • Tools like Security Trails can be used to query DNS records effectively.

Common DNS Records Types:
  • A Records: Point to IP addresses.

  • MX Records: Point to mail servers.

  • CNAME Records: Canonical names and aliases.


LO#09: Use Different Techniques for Network Footprinting

Identifying Network Ranges
  • Tools such as ARIN allow attackers to discover the IP address ranges used by target organizations, enabling them to map networks.

Traceroute Utility
  • Utilizes ICMP protocol to discover routers along a path to a target host, helping locate devices like routers and firewalls.


LO#10: Demonstrate Footprinting through Social Engineering

Social Engineering Techniques
  • Includes tactics such as eavesdropping, shoulder surfing, dumpster diving, and impersonation to extract confidential information.

Example Techniques:
  • Eavesdropping: Unauthorized listening into conversations.

  • Shoulder Surfing: Secretly observing the target.


LO#11: Use Various Footprinting Tools

Key Tools:
  • Maltego: Connects information between people, organizations, and websites.

  • Recon-ng: Web reconnaissance framework for open-source data gathering.

  • theHarvester: Tool for gathering emails and user information from various sources.

  • FOCA: Extracts metadata from documents.


LO#12: Explain Footprinting Countermeasures

Defensive Measures
  • Restrict employee access to social networking sites.

  • Educate staff on security practices and pseudonyms use.

  • Ensure critical information is secured and limit exposure in public forums.


Summary

In this module, we have discussed:

  • The concepts of footprinting and its importance in cyber security.

  • Various techniques and methodologies for effective footprinting.

  • Tools to conduct footprinting and countermeasures against it.