WHAT IS FOOTPRINTING?. FOOTPRINTING  Active  Passive - Passive footprinting is a method in which the attacker never makes any contact with the target.

Slides:



Advertisements
Similar presentations
Module II Footprinting
Advertisements

Let's say we want to access domain - reliablescribe.com First we need to buy a computer We need to subscribe to an Internet Service Provider (ISP) The.
NetScanTools ® LE Law Enforcement Version of NetScanTools ® from Northwest Performance Software, Inc. netscantools.com.
This module will familiarize you with the following:  Overview of the Reconnaissance Phase  Footprinting: An Introduction  Information Gathering Methodology.
Chapter 2 Gathering Target Information: Reconnaissance, Footprinting, and Social Engineering.
QoS Solutions Confidential 2010 NetQuality Analyzer and QPerf.
Footprinting February 16, 2010 MIS 4600 – MBA © Abdou Illia.
Week 2 -1 Week 2: Footprinting What is Footprinting? –Systematic collection of information on an intended target with the goal to create a complete profile.
Scanning February 23, 2010 MIS 4600 – MBA © Abdou Illia.
Security Tools CS-480b Dick Steflik. CACLS Windows NT, W2000, XP Displays or modifies access control lists (ACLs) of files.
Network Analyzer Example
CSC586 Network Forensics IP Tracing/Domain Name Tracing.
Reconnaissance Steps. EC-Council Gathering information from Open Sources  Owner of IP-address range  Address Range  Domain Names  Computing Platforms.
Penetration Testing.
EC-Council’s Certified Ethical Hacker (CEH) Richard Henson May 2012.
Forensic and Investigative Accounting
Load-Balance/Route Policy Advanced Routing. Outline How does it Work – When matching criteria, send via the route What does it Do – 2 real usage examples.
Exercises ARP ICMP DNS HTTP/TCP Trace analysis. ARP launch Wireshark ipconfig /all ; see local IP and gateway route -print ; find gateway arp -a ; list.
Network Reconnaissance
CNIT 124: Advanced Ethical Hacking. CASING THE ESTABLISHMENT CASE STUDY.
Network Tools TCP/IP interface configuration query - MAC (HW) address and IP address – Linux - /sbin/ifconfig – MS Windows – ipconfig/all 1.
 Ping - Transmits four 32 byte packets to target computer ◦ Measures response time ◦ Returns IP address of target computer ◦ Example: ping uottawa.ca.
NSLOOKUP CNIT 102 Substitute lecture Sam Bowne.
Denial of Service Bryan Oemler Web Enhanced Information Management March 22 nd, 2011.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
CIS 450 – Network Security Chapter 3 – Information Gathering.
Attack Methods Chapter 4 Corporate IT Security Copyright 2002 Prentice-Hall.
DIYTP Assessing a System - Basics  Why?  Vulnerabilities  What to look at:  The six ‘P’s  Patch  Ports  Protect  Policies  Probe  Physical.
 Why is this important to you?  How do digital footprints connect with digital citizenship?  Does everyone have a digital footprint?
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
# Ethical Hacking. 2 # Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting.
Use cases Navigation Problem notification Problem analysis.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Troubleshooting Your Network Networking for Home and Small Businesses.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Assessing a Target System Source: Chapter 3 Computer Security Fundamentals Chuck Easttom Prentice Hall, 2006.
Module 3 – Information Gathering  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability Identification.
N ETWORKING L AB. A CCESS TO C OMMAND P ROMPT PC: Start Button > search bar > type cmd Or Start Button > accessories folder > Command Prompt MAC: Applications.
Advanced Packet Analysis and Troubleshooting Using Wireshark 23AF
PRACTICAL INTRODUCTION TO INTERNET TECHNOLOGY. Practical one PACKET DELAY AND LOSS IN INTERNET In this experiment, you will observe real delays and loss.
TCOM Information Assurance Management Casing the Establishment.
Footprinting and Scanning
Internet Infrastructure Mapping the World Wide Web.
Network Reconnaissance CS490 - Security in Computing Copyright © 2005 by Scott Orr and the Trustees of Indiana University.
Application of the Internet 1998/12/09 KEIO University, JAPAN Mikiyo
Footprinting. Traditional Hacking The traditional way to hack into a system the steps include: Footprint: Get a big picture of what the network is Scan.
Footprinting/Scanning/ Enumeration Lesson 9. Footprinting External attack: Enables attackers to create a profile of an organization’s security posture.
 Terms:  “Security”: is a system’s ability to provide services while maintaining the five IA pillars  “Attack”: an action that violates one of the.
Modern information gathering Dave van Stein 9 april 2009.
1 Web Search What are easy ways to create a website? 2 Web Search What is a blog? What type of content does this type of website provide? 3 Web.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Department of Computer Science Introduction to Information Security Chapter 7 Activity Security Assessment Semester 1.
Tools We Are Going To Use
COLIN O’HANLON & NICK CIGANKO Sam Spade: Network Query Tool.
Penetration Testing Reconnaissance 2
CompTIA Network+ N Authorized Cert Guide
Footprinting and Scanning
Foot Printing / Scanning Tools Lect 4 – NETW 4006
Footprinting (definition 1)
Kennesaw State University
Footprinting and Scanning
Website: Contact No: ID:
2018 Latest Eccouncil Exam Questions Answers - Eccouncil Dumps PDF
FootPrinting CS391.
Learning objectives By the end of this unit you should: Explain
Traceroute demonstration
Reconnaissance Report of Lincoln Financial Group
Acknowledgement Content from the book:
Footprinting. Сбор данных
How hackers do it Ron Woerner Security Administrator CSG Systems, Inc.
Presentation transcript:

WHAT IS FOOTPRINTING?

FOOTPRINTING  Active  Passive - Passive footprinting is a method in which the attacker never makes any contact with the target systems

FOOTPRINTING  Passive - Passive footprinting is a method in which the attacker never makes any contact with the target systems  google search – inurl: intitle: site: filetype:  whois queries  IP Address (  DNS lookup  social networking sites

FOOTPRINTING  ACTIVE FOOTPRINTING  MIRRORING WEBSITE Downloads all available contents for offline analysis. Teleport Pro iMiser HTTrack web site coppier  TRACKING Examine processing path. tracker pro MSGTAG Polit zendio

FOOTPRINTING Continue……… ACTIVE FOOTPRINTING  SERVER VARIFICATION Determines Servers are reachable? Enumerate Network Path From attacker to Target Identifies Connectivity With Target  Ping  Tracert  Visual Traceroute  Sam Spade  TCR Trace Route

FOOTPRINTING Tools We Are Going To Use Google Searching & website.informer.com HTTrack Web Site Coppier tracker Pro Ping Tracert ( Sam Spade