FootPrinting - PSU

Download Report

Transcript FootPrinting - PSU

FootPrinting
CS391
Overview
 What
is footprinting?
 Main steps of footprinting.
What is Footprinting?
 Create
a complete profile of an
organization’s security posture using a set
of tools and techniques.
 The profile usually includes detailed
information about IP addresses and
blocks, range of domain names, remote
access, intranet structure, systems
connected to the Internet …etc.
Main Steps
 Usually,
the process involves six steps:
 Determine scope of activities.
 Get proper authorization.
 Collect publicly available information
 WHOIS and DNS enumeration
 DNS Interrogation
 Network Reconnaissance
Determine Scope of Activities
 Organization
networks are usually very
large. One focuses only on sub-targets.
Get Proper Authorization
 Try
to gain access to the system using a
proper account.
Publicly Available Information
 Company
websites and pages.
 Physical location.
 Related organizations.
 Privacy, security policies adopted.
 Disgruntled employees.
Where can I find the required
information?
ICANN Structure
Google Information
Nesma Information
WHOIS and DNS Enumeration
 Internet
domain names.
 IP address numbers.
 Protocol parameters and port numbers.
DNS Interrogation:
 Many
people use nslookup for this
purpose:
nslookup
Types of Queries

Type A
A simple query for the IP address corresponding to DNS

Type CNAME

A given host can have several DNS names. One of these is the
canonical or reference name.
Type MX
A mail exchanger query, to discover the real name of the
corresponding mail server

Type HINFO
An HINFO query. This is only useful if the DNS domain administrator
has bothered to create the relevant records and keep them up to
date.
Network Reconnaissance
 Traceroute
is the tool.
Superscan:
Supersacn
Enumerate