Week 2 -1 Week 2: Footprinting What is Footprinting? –Systematic collection of information on an intended target with the goal to create a complete profile.

Slides:



Advertisements
Similar presentations
Module II Footprinting
Advertisements

NetScanTools ® LE Law Enforcement Version of NetScanTools ® from Northwest Performance Software, Inc. netscantools.com.
 Dynamic policies o Change as system security state/load changes o GAA architecture  Extended access control lists  Pre-, mid- and post-conditions,
This module will familiarize you with the following:  Overview of the Reconnaissance Phase  Footprinting: An Introduction  Information Gathering Methodology.
Support for Windows 7 Chapter 2 Securing and Troubleshooting Windows 7.
Chapter 2 Gathering Target Information: Reconnaissance, Footprinting, and Social Engineering.
SYSTEM ADMINISTRATION Chapter 19
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
TA : Eng.Hala O. Abu Radi.. Nslookup Command SYNOPSIS nslookup [-option... ] [host-to-find | -[server ] ] DESCRIPTION Nslookup is a program to query Internet.
Footprinting February 16, 2010 MIS 4600 – MBA © Abdou Illia.
Security Tools CS-480b Dick Steflik. CACLS Windows NT, W2000, XP Displays or modifies access control lists (ACLs) of files.
Chapter 5 Phase 1: Reconnaissance. Reconnaissance  Finding as much information about the target as possible before launching the first attack packet.
Chapter 11: Networking with TCP/IP and the Internet Network+ Guide to Networks Third Edition.
Hands-On Microsoft Windows Server 2003 Networking Chapter 6 Domain Name System.
CSC586 Network Forensics IP Tracing/Domain Name Tracing.
Common network diagnostic and configuration utilities A ‘toolkit’ for network users and managers when ‘troubleshooting’ is needed on your network.
Reconnaissance Steps. EC-Council Gathering information from Open Sources  Owner of IP-address range  Address Range  Domain Names  Computing Platforms.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 19 Domain Name System (DNS)
Phishing Analysis. Ojectives Phishing Internet Protocol (IP) addresses Domain Name System (DNS) names Analyse “From” addresses Analyse URL’s Trace the.
TCP/IP Tools Lesson 5. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Using basic TCP/IP commands Understanding TCP/IP3.6.
Click to edit Master subtitle style Chapter 17: Troubleshooting Tools Instructor:
Chapter 11: Networking with TCP/IP and the Internet.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing Fundamentals Internetworking Fundamentals Instructor: Abdirahman I. Abdi.
Networking Basics: DNS IP addresses are usually paired with more human-friendly names: Domain Name System (DNS). internet.rutgers.edu HostnameOrganizationTop-level.
Monitoring and Troubleshooting Chapter 17. Review What role is required to share folders on Windows Server 2008 R2? What is the default permission listed.
Module 7: Configuring TCP/IP Addressing and Name Resolution.
Hands-on Networking Fundamentals
Footprinting Richard Newman “If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the.
Network Reconnaissance
CNIT 124: Advanced Ethical Hacking. CASING THE ESTABLISHMENT CASE STUDY.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
Network Tools TCP/IP interface configuration query - MAC (HW) address and IP address – Linux - /sbin/ifconfig – MS Windows – ipconfig/all 1.
Chapter 10 Networking and the Internet ITSC 1458.
DNS (Domain Name System). Domain Name System (DNS) Developed by Postel & Mockapetris is a good site to browse The phone.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 6: Name Resolution.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network, Enhanced Chapter 6: Name Resolution.
CIS 450 – Network Security Chapter 3 – Information Gathering.
Communication Between Networks How the Internet Got Its Name.
Day 14 Introduction to Networking. Unix Networking Unix is very frequently used as a server. –Server is a machine which “serves” some function Web Server.
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
Network Assessment How intrusion techniques contribute to system/network security Network and system monitoring System mapping Ports, OS, applications.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Troubleshooting Your Network Networking for Home and Small Businesses.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Assessing a Target System Source: Chapter 3 Computer Security Fundamentals Chuck Easttom Prentice Hall, 2006.
ROAD TO EXPLOITATION Dr. Andy Wu BCIS 4630 Fundamentals of IT Security.
TCOM Information Assurance Management Casing the Establishment.
Footprinting and Scanning
Network Reconnaissance CS490 - Security in Computing Copyright © 2005 by Scott Orr and the Trustees of Indiana University.
Web Server Administration Chapter 4 Name Resolution.
CPMT 1449 Computer Networking Technology – Lesson 3
Footprinting. Traditional Hacking The traditional way to hack into a system the steps include: Footprint: Get a big picture of what the network is Scan.
Module 14: Advanced Topics and Troubleshooting. Microsoft ® Windows ® Small Business Server (SBS) 2008 Management Console (Advanced Mode) Managing Windows.
Footprinting/Scanning/ Enumeration Lesson 9. Footprinting External attack: Enables attackers to create a profile of an organization’s security posture.
Chapter 4: server services. The Complete Guide to Linux System Administration2 Objectives Configure network interfaces using command- line and graphical.
Chapter 5e.  Upon completion of this chapter, you should be able to:  Find IP configuration settings on Windows & Linux  Troubleshoot IP configuration.
WHAT IS FOOTPRINTING?. FOOTPRINTING  Active  Passive - Passive footprinting is a method in which the attacker never makes any contact with the target.
Ping and Traceroute by Aleisa A. Drivere Supervisor Graciela Perera.
Penetration Testing Reconnaissance 2
Click to edit Master subtitle style
CompTIA Network+ N Authorized Cert Guide
Footprinting and Scanning
Network Tools and Utilities
Instructor Materials Chapter 9: Testing and Troubleshooting
Troubleshooting Speaker Saengsan Tinarak Channel
Footprinting and Scanning
FootPrinting CS391.
Acknowledgement Content from the book:
Windows Server Administration Fundamentals
Module 12 Network Configuration
Windows Name Resolution
Presentation transcript:

Week 2 -1 Week 2: Footprinting What is Footprinting? –Systematic collection of information on an intended target with the goal to create a complete profile of the organization’s security posture. –System & Security Administrators info.

Week 2 -2 Week 2: Footprinting Steps for gathering information –Search engines: Google, Netscape,Alta Vista, Ask Jeves, Yahoo, etc. –Databases: EDGAR, Switchboard.com, Credit Bureau, Social Security, Voting, Financial, Vital Statistics, Registrar

Week 2 -3 Week 2: Footprinting WHOIS –whois – internet user name directory service (command line – “man whois”) –American Registry –Europe & North Africa –Asia Pacific –Others Afrinic, lacnic, apjii, cnnic, jpnic, krnic, twnic

Week 2 -4 Week 2: Footprinting – –This site is a leader in wholesale internet services –Largest ICANN accredited wholesale domain registrar. –Large library of free or shareware software.

Week 2 -5 Week 2: Footprinting –Hacking Tool: Sam Spade –Can suck down entire web sites and search source pages for juicy information. Windows Any platform w/web client

Week 2 -6 Week 2: Footprinting –Analyzing Whois output The registrant The domain name The administrative contact When record was created/updated Primary & secondary DNS servers

Week 2 -7 Week 2: Footprinting –Nslookup –Tool to query the DNS Two modes of operation interactive or command line Cmd nslookup IP # (returns name) Cmd nslookup name (returns IP) Nslookup Now in interactive mode – type ? For help Linux suggests “host” or “dig” instead

Week 2 -8 Week 2: Footprinting –Finding Address Range of Network Lists of registrars are available at – List of whois servers outside US –

Week 2 -9 Week 2: Footprinting –ARIN American Registry for Internet Numbers (North America, South America, the Caribbean and sub-Saharan Africa) If IP number not assigned to ARIN it will indicate which registry is authority for the number. Few numbers are not assigned yet or used for testing.

Week Week 2: Footprinting –Traceroute This tool is intended as a network troubleshooting tool but it can be useful to determine network topology as well as potential access paths to the target. Spelled “tracert” on Windows due to legacy issues. Note default on Unix is to use UDP packets with option (-I) to use ICMP.

Week Week 2: Footprinting –Hacking Tool: NeoTrace This tool will provide a graphical depiction of each network hop. –Visual Route Graphical geographic display of each hop.

Week Week 2: Footprinting –Visual Lookout For the experienced technician VisualLookout is best described as a real- time netstat that also provides history and a rich set of features to help locate unwelcome visitors."

Week Week 2: Footprinting –Hacking Tool: Smart Whois Unlike standard Whois utilities, SmartWhois can find the information about a computer located in any part of the world, delivering all the related records within a few seconds. Even if an IP address cannot be resolved to a hostname, it's not a problem for SmartWhois.

Week Week 2: Footprinting –Hacking Tool: Tracking Pro I am unable to find any info on this tool except from several other ethical security courses who have this same tool in their syllabus.

Week Week 2: Footprinting –Hacking Tool: MailTracking.com

Week Week 2: Footprinting –Summary –Reconnaissance is the first step of Profiling the target –Does not involve direct contact with the target but acquires the information from other sources.