Professional Documents
Culture Documents
Foot Printing PDF
Foot Printing PDF
2
AmiEs 2015,, Oostende, Belgium
Crackers vs. Hackers
3
AmiEs 2015,, Oostende, Belgium
Hacking History
1960 hackers:
• First generation of hackers, technology
enthusiasts, “geeks”
• Hacking was motivated by intellectual curiosity;
causing damage or stealing information was
“against the rules” for this small number of
people.
1980 hackers:
• Hackers started gaining more of the negative
connotations. Media attention started altering
the image of a hacker from a technology
enthusiast to a computer criminal.
4
AmiEs 2015,, Oostende, Belgium
Hacking History
5
AmiEs 2015,, Oostende, Belgium
Hacking History
6
AmiEs 2015,, Oostende, Belgium
Hacking History
7
AmiEs 2015,, Oostende, Belgium
Hacking Methodology
Footprinting Scanning
Planting Backdoors
8
AmiEs 2015,, Oostende, Belgium
Hacking Methodology
9
AmiEs 2015,, Oostende, Belgium
Hacking Methodology
10
AmiEs 2015,, Oostende, Belgium
Hacking Methodology
12
AmiEs 2015,, Oostende, Belgium
Hacking Overview
13
AmiEs 2015,, Oostende, Belgium
Footprinting
14
AmiEs 2015,, Oostende, Belgium
Footprinting
15
AmiEs 2015,, Oostende, Belgium
Footprinting
16
AmiEs 2015,, Oostende, Belgium
The information on a company web site
17
AmiEs 2015,, Oostende, Belgium
Wayback Machine
19
AmiEs 2015,, Oostende, Belgium
Job Postings
21
AmiEs 2015,, Oostende, Belgium
Discovering Financial Information
23
AmiEs 2015,, Oostende, Belgium
Google Hacking
25
AmiEs 2015,, Oostende, Belgium
Google Hacking
26
AmiEs 2015,, Oostende, Belgium
Google Hacking
27
AmiEs 2015,, Oostende, Belgium
Google Hacking
28
AmiEs 2015,, Oostende, Belgium
Google Hacking
29
AmiEs 2015,, Oostende, Belgium
Exploring Domain Information Leakage
31
AmiEs 2015,, Oostende, Belgium
Root Zone Database
32
AmiEs 2015,, Oostende, Belgium
Automatic Registrar Query
34
AmiEs 2015,, Oostende, Belgium
Automatic Registrar Query
36
AmiEs 2015,, Oostende, Belgium
Automatic Registrar Query
tracerout:
• shows the IP address, name, the time it too to
reach each host and return a response, giving a
clear picture of the path to connect to the
remote host and the time to do so.
37
AmiEs 2015,, Oostende, Belgium
Tracerout
38
AmiEs 2015,, Oostende, Belgium
Internet Assigned Numbers Authority
(IANA)
39
AmiEs 2015,, Oostende, Belgium
Internet Assigned Numbers Authority
(IANA)
42
AmiEs 2015,, Oostende, Belgium
Regional Internet Registers (RIRs)
43
AmiEs 2015,, Oostende, Belgium
Tracking Employees
44
AmiEs 2015,, Oostende, Belgium
Tracking Employees
45
AmiEs 2015,, Oostende, Belgium
Tracking Employees
46
AmiEs 2015,, Oostende, Belgium
Tracking Employees
47
AmiEs 2015,, Oostende, Belgium
Exploiting Insecure Applications