Jose Ortiz jose.ortiza@softtek.com Cosme Ozuna cosme.ozuna@softtek.com FOCA Pro Jose Ortiz jose.ortiza@softtek.com Cosme Ozuna cosme.ozuna@softtek.com.

Slides:



Advertisements
Similar presentations
Metadata for Digital Content at the Library of Congress Jane Mandelbaum Information Technology Services Library of Congress May 2009.
Advertisements

Website Designing & Development Designed By Steer Logix Private Limited.
ELPUB 2006 June Bansko Bulgaria1 Automated Building of OAI Compliant Repository from Legacy Collection Kurt Maly Department of Computer.
11© 2011 Hitachi Data Systems. All rights reserved. HITACHI DATA DISCOVERY FOR MICROSOFT® SHAREPOINT ® SOLUTION SCALING YOUR SHAREPOINT ENVIRONMENT PRESENTER.
I NDULGENC E There is no need for oversight or management direction. All staff members are superstars and act in the best interest of the company.
FOCA 2.5 Chema Alonso. What’s a FOCA? FOCA on Linux?
Collections Management Museums Bristol 2009 – EMu Development Process KE EMu Development Process Alex Fell Operations Manager KE Software UK.
USING CRM SYSTEMS AS A RAD PLATFORM Vivek Joshi
The Web is perhaps the single largest data source in the world. Due to the heterogeneity and lack of structure, mining and integration are challenging.
Static Analysis for Dynamic Assessments Greg Patton | September 2014.
Document Management: Doing it right in SP Online Presented by Deliveron Consulting Services
Build a SharePoint App with Microsoft Access. About me.
The Business of Penetration Testing
©2011 Quest Software, Inc. All rights reserved. Steve Walch, Senior Product Manager Blog: November, 2011 Partner Training Webcast.
Penetration Testing Edmund Whitehead Rayce West. Introduction - Definition of Penetration Testing - Who needs Penetration Testing? - Penetration Testing.
Enhanced Collaboration and other benefits of Sharepoint Technologies Kern Sutton Business Productivity Group Microsoft Corporation.
Metadata – Threats, PII at RISK ? Sudesh Gadewar.
The University of Texas System Board of Regents NAPAHE Annual Meeting March 2012 O NLINE B OARD P ORTALS Tina Holloway.
Lakeland Click arrow to advance show. Click on the “A” under “Listed By Name.” (“A” for Academic Search Database)
Konica’s Systems Engineering Center. Learn about our services Learn about our services Learn about technology Learn about technology.
Modern approaches to developing hardware and software system for operation and emergency control of large-scale power grid A.B. OSAK, A.V. DOMYSHEV, E.Y.
UFCFS D Technologies for the Web An Introduction to the Module.
CSC Proprietary 12/16/2015 1:14 PM Training Material 1 Manage the Student information Project 3 group: Tuong Nguyen – Trung Dang Mentor: Tam Ly.
Module 1: Overview of Microsoft Office SharePoint Server 2007.
Soon Joo Hyun Database Systems Research and Development Lab. US-KOREA Joint Workshop on Digital Library t Introduction ICU Information and Communication.
Copyright © 2006 Pilothouse Consulting Inc. All rights reserved. Course Overview Introduction Target Audiences Course Structure Virtual PC Demo.
Deploy Web Application Target Production Server. Web Server + Web Application Server (Archived) Web Server Web Application Server /webapps/${webapp}.war.
Tech Operation Operation’s KPI & Tasks Processes Team Architecture.
Design Proposal for a Form Processing Web Application to Implement Numerous Forms Larry Guentert, HRIS April 17, 2011.
Tools and techniques roundtable Dilbert 1. Tools and techniques roundtable Project Management Building Your own Personal PM Brand Roundtable From ‘No.
1 Thinking How often do you use the internet? For what purposes to you use the internet the most? 2 Web Search What is the internet? When did.
Modern information gathering Dave van Stein 9 april 2009.
Department of Computer Science Introduction to Information Security Chapter 7 Activity Security Assessment Semester 1.
Extension Module Webinar February 4th, Page 2 Webinar-Openbravo, Agenda Functionality and Demo15 min. Process and Tools15 min. Development Technique15.
Fuzzing Machine By Nikolaj Tolkačiov.
Information Systems Design and Development
Create and Assign Entity Roles
Best practices, ETL-patterns, self-experience
Footprinting and Scanning
INDULGENCE There is no need for oversight or management direction. All staff members are superstars and act in the best interest of the company.
Tor Good + Evil.
Module 8: Networking Services
Foot Printing / Scanning Tools Lect 4 – NETW 4006
New features and customization options
Footprinting (definition 1)
Get the Most Out of GoAnywhere: Advanced Workflows
Daniel Kouril, Ivo Nutar Masaryk University
Battalion: Automating Recon
OSINT Sharad
Introduction to Operating Systems
Pentesting with Powershell
Sanan Aamir and James Rowe Midwestern State University
Everything You Need To Know About Penetration Testing.
ILMT/BigFix Inventory Demo
Mobile Pen Testing w/ drozer
FootPrinting CS391.
{Insert your name here}
Pallavi Patwa CSTE,ISTQB (Foundation)
Presented By - Avinash Pawar
Unit# 5: Internet and Worldwide Web
Web Mining Department of Computer Science and Engg.
Canon.com/ijsetup - Ready to Setup your Canon Pixma Printers.
Experience with the process automation at SORS
COMPUTER NETWORKS PRESENTATION
Building Map Books in ArcGIS
Techniques.
WEB PAGES AND WEB SITES.
Working Group on Data, Information and Knowledge Exchange (WG DIKE)
LM 7. Mobile Network Overview
Presentation transcript:

Jose Ortiz jose.ortiza@softtek.com Cosme Ozuna cosme.ozuna@softtek.com FOCA Pro Jose Ortiz jose.ortiza@softtek.com Cosme Ozuna cosme.ozuna@softtek.com

Agenda Introduction What is FOCA Pro? Functionality Features Demo

About us Working at Softtek 2 Years of experience in Information Security Penetration testing Involved in pentest researches Working at Softtek for 1 year 1 year of experience in Information Security Penetration testing Wireless auditing Involved in Security Researches

What is FOCA? FOCA (Fingerprinting Organizations with Collected Archives) is a tool mainly used to find metadata and hidden information in the documents its scans. Specially useful in the task before a pen-test (footprinting), where we must collect all possible information about the target so that our task is performed in the best way.

Functionality FOCA includes a server discovery module, whose purpose is to automate the servers search process using recursively interconnected routines. The techniques used to this end are: Web Search DNS Search IP resolution PTR Scanning Bing IP Common names DNS Prediction Robtex

Demo

Questions? Thank you Jose Ortiz jose.ortiza@softtek.com Cosme Ozuna cosme.ozuna@softtek.com