You are on page 1of 66

Footprinting and

Reconnaissance
Module
Objective
Module Flow
Footprinting is the first step of any attack on information
systems in which an attacker collects information about a target
network for identifying various ways to intrude into the system

Types of Footprinting
Passive Footprinting Active Footprinting
What is Gathering information about
target without direct interaction
a Gathering information about the
target with direct interaction
Footprinting?
Information Obtained in Footprinting
Organization Information Network Information System Information
Employee details, telephone Domain and sub-domains, OSes and location of web
numbers, location, backgroundof network blocks, IP address of servers, users and passwords,
the organization, web the reachable systems, whois etc.
technologies, etc record, DNS, etc.
Know Security Footprinting allows attacker’s to knowthe security posture of the
Posture target organization

Reduce Focus It reduces the attacker’s focus area to a specific range of IP


Area addresses, networks, domain names, remote access, etc.

Objective of
Footprinting Identify
Vulnerabilities
It allows attacker to identify vulnerabilities in the target systems in
order to select appropriate exploits

Draw Network It allows attackers to draw a map or outline the target


Map organization’s network infrastructure to know about the
actualenvironment that they are going to break
Module Flow
Footprinting through Search Engines
Footprinting Using Advanced Google Hacking Techniques
Information Gathering Using Google Advanced Search and Image Search
Google Hacking Database
VoIP and VPN Footprinting through Google Hacking Database
Finding Company’s Top-level Domains (TLDs) and Sub-domains
Finding the Geographical Location on the Target
People Search on Social Networking Sites and PeopleSearch Services
Gathering Information from Linkedlin
Gathering Information from Finacial Services
Footprinting through Job Sites
Monitoring Target Using Alerts
Information Gathering Using Groups, Forums, and Blogs
Determining the Operating System
VoIP and VPN Footprinting through SHODAN
Collecting Information through Social Engineering on Social Networking Sites
Website Footprinting
Website Footprinting (cont’d)
Website Footprinting using Web Spiders
Mirroring Entire Website
Extracting Website Information from https://archive.org
Extracting Metadata of Public Documents
Monitoring Web Pages for Updates and Changes
Tracking Email Communications
Collecting Information from Email Header
Email Tracking Tools
Competitive Intelligence Gathering
Competitive Intelligence-When Did this Company Begin? How Did it Develop
Competitive Intelligence-What Are the Company’s Plans?
Competitive Intelligence-What Expert Opinions Say About the Company
Monitoring Website Traffic of Target Company
Tracking Online Reputation of the Target
Whois Lookup
Whois Lookup Result Analysis
Whois Lookup Tools
Finding IP Geolocation Information
Extracting DNS Information
DNS Interrogation Tools
Locate the Network Range
Traceroute
Traceroute Analysis
Traceroute Tools
Footprinting through Social Engineering
Collecting Information Using Eavesdropping Shoulder Surfing, and Dumpster Diving
Module Flow
Footprinting Tools: Maltego and Recon-ng
Footprinting Tools: FOCA and Recon-Dog
Footprinting Tools: OSRFramework
Additional Footprinting Tools
Module Flow
Footprinting Countermeasures
Footprinting Countermeasures (Cont’d)
Module Flow
Footprinting Pen Testing
Footprinting Pen Testing (Cont’d)
Footprinting Pen Testing (Cont’d)
Footprinting Pen Testing (Cont’d)
Footprinting Pen Testing Report Templates
Footprinting Pen Testing Report Templates (Cont’d)
Module Summary

You might also like