Footprinting and Information Gathering Techniques
Footprinting and Reconnaissance
- Definition: Footprinting is the process of gathering information about a target system or organization for security assessments or attack planning.
Information Gathering Types
- Types of Information:
- Personal Information:
- Name
- Phone Number
- Social Media Accounts
- Family Members
- Home Location
- City
- Company Information:
- Establishment Details
- Owner and Admin Emails
- Company Website
- Website Controller Details
Systems to Investigate
- Target Systems:
- Personal Devices: Computers, mobile systems, configurations.
- Company Systems: Operating Systems (Windows, Mac), software versions (e.g., Photoshop 64-bit).
Entities Belonging to the Target
- Example Entities:
- Website servers
- Devices (laptops, digital watches, phones, iPads)
Scanning Types
Active Scanning: Direct interaction with the target to gather information about the system.
- Example: Network scanning using specific commands.
Passive Scanning: Gathering information without direct interaction, such as through search engines or public databases.
Information Accuracy and Anonymity
Data Accuracy: Valid and reliable data is crucial for effective reconnaissance.
- Typical accuracies range from 33% to 100% based on the method and depth of investigation.
Anonymity Concerns: When gathering information, maintaining anonymity is crucial to avoid detection by the target.
Techniques for Information Gathering
- Active Techniques: Involves engagement with systems, such as through direct email communication or probing for responses.
- Passive Techniques: Information is collected through methods like search engines or public records without engaging with the target or system directly.
Example of Techniques
Google Hacking: Using advanced search techniques to gather information about a target.
Using DNS for Target Recognition: Identifying potential targets using Domain Name System (DNS) information, which can signal vulnerabilities in a network.
Search Engines
- Types of Search Engines:
- Basic Search Engines: Typically yield a wide range of results without specific targeting.
- Privacy-Oriented Search Engines: May focus on anonymity and data privacy, such as DuckDuckGo.
- Dark Web Search Engines: Used for gathering information that is hidden from standard web searches.
Conclusion
- Importance of Information Gathering: The information gathering process is essential for successful penetration testing or security assessments.
- Different Techniques: Knowing when to apply active or passive techniques based on the situation or target is vital for effective security operations.
- Organization Resources: Use various online resources (e.g., WsQTech, social media platforms, YouTube) to enhance your information gathering skills and techniques.