Tools We Are Going To Use

Slides:



Advertisements
Similar presentations
A brief guide to web-based . What do you need? A computer, a tablet or a smartphone An internet connection (ethernet, wifi or 3G) An account with.
Advertisements

Tracking Unwanted A companion document to Surfing the Information Highway Safely Peter Bilodeau, Educational Consultant (RECIT) Sir Wilfrid Laurier.
Chapter 2 Gathering Target Information: Reconnaissance, Footprinting, and Social Engineering.
Basics. 2 Class Outline Part 1 - Introduction –Explaining –Parts of an address –Types of services –Acquiring an account.
Google Search Using internet search engine as a tool to find information related to creativity & innovation.
Ahmad Radaideh.  Abstract  Introduction  Google Cached Content  GOOGLE HACKING Procedures  Google Advance Operators  Google hacking Result Categories.
XP Browser and Basics1. XP Browser and Basics2 Learn about Web browser software and Web pages The Web is a collection of files that reside.
07 December 2009Slide 1 of 1207 December 2009Slide 1 of 12 SQL Injection Primer By Nicole Gray, Cliff McCullough, Joe Hernandez.
07 December 2009Slide 1 of 9 SQL Injection Primer By Nicole Gray, Cliff McCullough, Joe Hernandez.
Privacy – what do they know about you? This work is licensed under a Creative Commons Attribution-Noncommercial- Share Alike 3.0 License. Skills: none.
Reconnaissance Steps. EC-Council Gathering information from Open Sources  Owner of IP-address range  Address Range  Domain Names  Computing Platforms.
Tips and Information Microsoft Outlook Quick Steps: Quick Steps are available to use from the Home tab. Outlook 2010 has a number of predefined.
Phishing Analysis. Ojectives Phishing Internet Protocol (IP) addresses Domain Name System (DNS) names Analyse “From” addresses Analyse URL’s Trace the.
Starter for 10 Unit 7: Using Messenger Transform IT SFT07_messenger.
1 Outlook Live Live Messenger SkyDrive Office Live Live Spaces Live Groups.
Technology ICT Option: . Electronic mail is the transmission of mainly text based messages across networks This can be within a particular.
English Comprehension and Composition – Lecture 25 Objectives: What is an ? Basics of an Tips for Writing Effective s.
Forensic and Investigative Accounting
Topics Basic Internet Concepts. Types of Information. Search Tools & Techniques. Managing Internet Resources. Browsing a mail. Composing a mail. Attaching.
Unit 9 Communication Services
Cyber Crimes.
GOOGLE HACKING FOR PENETRATION TESTERS Chris Chromiak SentryMetrics March 27 th, 2007.
Computer Learning Ph.D. Candidate Department of Electrical and Computing Engineering University of Delaware Instructor: Jonghyun Kim 5 (Beginning Level)
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
1. 2 Windows Live Hotmail  offers access via special Outlook Connector software o provides a two-way sync for  mail  calendar  contacts o access.
Unit 10 Communication Services.  Identify types of electronic communication  Describe users of electronic communication  Identify major components.
Network Tools TCP/IP interface configuration query - MAC (HW) address and IP address – Linux - /sbin/ifconfig – MS Windows – ipconfig/all 1.
How the Internet Works: What happens when information is sent from your computer?
Chapter 3 Social Media Revolution Video. 1. Guidelines a. Determine the information you need. b. Consider who is likely to have the info. c. Communicate.
A beginner’s guide to Webmail. What do you need? A computer, or a smartphone An internet connection An account with an service provider.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
Forensic and Investigative Accounting Chapter 14 Digital Forensics Analysis © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
Basics. 2 Professional Development Centre Class Outline Part 1 - Introduction –Explaining –Parts of an address –Types of services.
Unit 10 Communication Services
Beginners Course Lesson 4. Review 1. Basic Terminology 2. Getting Connected 3. Browser Intro 4. programs.
Outlook Web App Crash course. Outlook Agenda Login Login Reset Password Reset Password Getting Started in Outlook Web App Getting Started in Outlook Web.
Understanding Search Engines What Is The Web? Web Search Lesson Plan Module A1.
Copyright Security-Assessment.com 2005 GoogleMonster Using The Google Search Engine For Underhand Purposes by Nick von Dadelszen.
The Internet 8th Edition Tutorial 3 Using Web-Based Services for Communication and Collaboration.
Internet Safety and Productivity Tips Presented by ITS Kerri Sorenson and Sean Hernandez December 11, 8:30-9:00 am.
Technical Awareness on Analysis of Headers.
Amanda Fristy Damara Thea Bayu Gerhana Yuda Evita Fitri Ila Uswatun Hasanah Putri Ayuning Kartika Presented by :
Footprinting and Scanning
Google Hacking University of Sunderland CSEM02 Harry R Erwin, PhD Peter Dunne, PhD.
Chapter 9 Sending and Attachments. Sending and Attachments FAQs: – How does work? – How do I use local ? – How do I use Web-based.
Modern information gathering Dave van Stein 9 april 2009.
Google Hacking: Tame the internet Information Assurance Group 2011.
WHAT IS FOOTPRINTING?. FOOTPRINTING  Active  Passive - Passive footprinting is a method in which the attacker never makes any contact with the target.
Working On-Line Module 4 People's Resource Center Barry Glicklich Last updated 27 March 2012Working On-Line (BG)1.
CS 115: COMPUTING FOR THE SOCIO-TECHNO WEB TECHNOLOGIES FOR PRIVATE (AND NOT-SO-PRIVATE) COMMUNICATIONS.
Why Does The Site Need an SSL Certification?. Security should always be a high concern for your website, but do you need an SSL certificate? A secure.
Penetration Testing Reconnaissance 2
For More Information Call Us Toll Free At Visit Our Website
LESSON Networking Fundamentals Understand TCP/IP.
& Google Gmail.
Understanding Search Engines
Understanding Search Engines
Footprinting and Scanning
Internet Identity, Safety, & Security
Class 2 - Transitional Internet Basics
Intro to Ethical Hacking
How And The Internet Work
Troubleshooting IP Communications
Internet LINGO.
Footprinting and Scanning
Attach In Gmail very Easily
How To Use As Another Account On Gmail
Learning objectives By the end of this unit you should: Explain
Computer Security.
Acknowledgement Content from the book:
Presentation transcript:

Tools We Are Going To Use FOOTPRINTING Tools We Are Going To Use Google Searching hackersforcharity.org & exploit-db.com People Search/ archive.org website.informer.com HTTrack Web Site Copier email tracker Pro vtrace Ping Tracert

FOOTPRINTING Google Hacking The Google Hacking Database (GHDB) is a compiled list of common mistakes web/server admins make, which can be easily searched by using Google. administrator consoles password files credit card numbers unprotected webcams etc.

Google Hacking Data Base FOOTPRINTING Google Hacking Data Base (www.exploits-db.org) (www.hackersforcharity.org) These sites: Exploit DB and hackersforcharity have more info on the actual queries, how they're structured, and what kind of information you can find Tool - Google hack . gives an indication as to the type of information you can find, but is not as specific as the above mentioned sites.

FOOTPRINTING Google Searching intitle Intext Inurl Filetype Link allintitle: milind hirkane(intitle:1 + intitle:2) allintext: milind hirkane(intext:1 + intext:2) site: example.com

spokeo / AnyWho FOOTPRINTING People Search Residential Addresses And E-mail Address Contact number & Date of Birth Photo and Social Networking Profile Blog url Satellite pics of private resindences

FOOTPRINTING Website.informer.com Ip address Website owner name Owner phone number Owner E-mail id Address Created Expiry Dns

FOOTPRINTING Website.informer.com

FOOTPRINTING Website.informer.com

FOOTPRINTING E-mail Tracker Pro Examine e-mail Tracking path E-mail header Gmail Log in to Gmail Open the message you'd like to view headers for. Click the down arrow next to Reply, at the top of the message pane. Select Show Original

FOOTPRINTING E-mail header Hotmail Log in to your Hotmail account. Select Inbox from the left-side menu. Right-click the message you'd like to view headers for and select View Message Source. The full headers will appear in a new window

FOOTPRINTING E-mail header Yahoo Log in to your Yahoo! Mail account. Select the message you'd like to view headers for. Click the Actions dropdown and select View Full Header

HTTrack web site copier FOOTPRINTING HTTrack web site copier Down load any website for offline analysis No Risk www.httrack.com

FOOTPRINTING Ping (Packet internet groper) Determines Servers are reachable? Identifies Connectivity With Target C:\ ping target(ip)/domain name A program that system administrators and hackers or crackers use to determine whether a specific computer is currently online and accessible

FOOTPRINTING Trcert (trace route) Enumerate Network Path From attacker to Target C:\ tracert target(ip) / domain name