MIS 5211.001 Week 3 Site:

Slides:



Advertisements
Similar presentations
Welcome! Were Glad Youre Here!. Whats New In Version 5.1b-100 Welcome to The Annual Information & Records Associates, Inc. User Conference May 20, 2009.
Advertisements

NetScanTools ® LE Law Enforcement Version of NetScanTools ® from Northwest Performance Software, Inc. netscantools.com.
Click the Enter button to begin using the Compendium Click to continue.
Microsoft Excel 2003 Illustrated Complete Excel Files and Incorporating Web Information Sharing.
This module will familiarize you with the following:  Overview of the Reconnaissance Phase  Footprinting: An Introduction  Information Gathering Methodology.
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
Chapter 2 Gathering Target Information: Reconnaissance, Footprinting, and Social Engineering.
Pasewark & Pasewark Microsoft Office XP: Introductory Course 1 INTRODUCTION Lesson 1 – Microsoft Office XP Basics and the Internet.
Google Search Using internet search engine as a tool to find information related to creativity & innovation.
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
Week 2 -1 Week 2: Footprinting What is Footprinting? –Systematic collection of information on an intended target with the goal to create a complete profile.
Welcome to the Ivy Tech Community College Online Employment System Applicant Tutorial.
07 December 2009Slide 1 of 1207 December 2009Slide 1 of 12 SQL Injection Primer By Nicole Gray, Cliff McCullough, Joe Hernandez.
Hands-On Microsoft Windows Server 2003 Networking Chapter 6 Domain Name System.
07 December 2009Slide 1 of 9 SQL Injection Primer By Nicole Gray, Cliff McCullough, Joe Hernandez.
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 6 Enumeration.
Start the slide show by clicking on the "Slide Show" option in the above menu and choose "View Show”. or – hit the F5 Key.
Activating Pilot Account ( first time users ) Web-based Activation Browse to 1. Click on the link on the lower right that says.
MIS Week 7 Site:
MIS Week 3 Site:
Welcome to the University of Florida Online Employment System Applicant Tutorial.
Welcome to the Alaska Statewide System Online Employment System Applicant Tutorial.
Start the slide show by clicking on the "Slide Show" option in the above menu and choose "View Show”. or – hit the F5 Key.
ARCHIBUS Log On Instructions. Log Into ARCHIBUS Web Central Log In Screen 1.Open your Internet browser. 2.Enter the URL to view the ARCHIBUS Login Page.
With Internet Explorer 9 Getting Started© 2013 Pearson Education, Inc. Publishing as Prentice Hall1 Exploring the World Wide Web with Internet Explorer.
Google is the Internet’s most popular search engine.
Welcome to the Southeastern Louisiana University’s Online Employment Site Applicant Tutorial!
Start the slide show by clicking on the "Slide Show" option in the above menu and choose "View Show”. or – hit the F5 Key.
GOOGLE HACKING FOR PENETRATION TESTERS Chris Chromiak SentryMetrics March 27 th, 2007.
Classroom User Training June 29, 2005 Presented by:
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
1 Networks and the Internet PCS115 Introduction to the Internet ©Richard L. Goldman December 7, 2006.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web Lecture 2 This material was developed by Oregon Health.
HOW WEB SERVER WORKS? By- PUSHPENDU MONDAL RAJAT CHAUHAN RAHUL YADAV RANJIT MEENA RAHUL TYAGI.
Open Internet Explorer Go to: my.ccsd.net Type YOUR InterAct username and password. Then Submit Query.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 6: Name Resolution.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network, Enhanced Chapter 6: Name Resolution.
Start the slide show by clicking on the "Slide Show" option in the above menu and choose "View Show”. or – hit the F5 Key.
1 Welcome to CSC 301 Web Programming Charles Frank.
1 After completing this lesson, you will be able to: Transfer your files to the Internet. Choose a method for posting your Web pages. Use Microsoft’s My.
Copyright Security-Assessment.com 2005 GoogleMonster Using The Google Search Engine For Underhand Purposes by Nick von Dadelszen.
Prepared By : Md Jakaria 1 Learn Internet Basics LECTURE 7.
HTML, Third Edition--Illustrated Brief 1 HTML, Third Edition Illustrated Brief Unit A Creating an HTML Document.
Introduction to KE EMu
Data Migration Training Page 1 KE EMu Data Migration
Introduction to KE EMu Unit objectives: Introduction to Windows Use the keyboard and mouse Use the desktop Open, move and resize a.
Introduction to KE EMu Unit objectives: Introduction to Windows Use the keyboard and mouse Use the desktop Open, move and resize a.
Landscaper 101. Time Code AMC AMCNET HELP!!! Where do you go for help? –Upper right corner has a ? for the online help –This presentation.
Footprinting and Scanning
CS3695 – Network Vulnerability Assessment & Risk Mitigation – Supplemental Slides to Module #2 Footprinting and Reconnaissance Intelligence Gathering CEH.
Google Hacking University of Sunderland CSEM02 Harry R Erwin, PhD Peter Dunne, PhD.
ADVANCED COMPUTERS S.Y.B.M.M. LECTURE SERIES - PART 1 - KANISHKA KHATRI m.
Web Design Terminology Unit 2 STEM. 1. Accessibility – a web page or site that address the users limitations or disabilities 2. Active server page (ASP)
Microsoft Windows 7 - Illustrated Unit G: Exploring the Internet with Microsoft Internet Explorer.
Week-6 (Lecture-1) Publishing and Browsing the Web: Publishing: 1. upload the following items on the web Google documents Spreadsheets Presentations drawings.
Once logged-in, you will be taken into the Full text journals, databases, and other resources sub-page of the website. Note the ‘You are logged’ in message.
Modern information gathering Dave van Stein 9 april 2009.
Google Hacking: Tame the internet Information Assurance Group 2011.
Tools We Are Going To Use
Intro to Ethical Hacking
Footprinting and Scanning
Browsing and Searching the Web
Intro to Ethical Hacking
Footprinting and Scanning
Intro to Ethical Hacking
Configuring Internet-related services
Manual Water Ski Directory
The Art of Passive Recon
Windows Name Resolution
Google Hacking Damian Gordon.
Presentation transcript:

MIS Week 3 Site:

 Certifications  In the news  Google Hacking  Reconnaissance 2MIS

 Certifications  Starter Certs  CompTia’s Security+  CompTia’s Network+ or Cisco CCNA  Technical Certs  GIAC GSEC and GCIH  Higher Level Certs  ISC 2 CISSP  ISACA CISA  ISACA CISM  ISACA CSX (Brand New) MIS

 Test hacking environment (Kali 2.0, VMware Player, VMware Workstation [Temple’s SW Repository], etc) MIS

 Submitted  protect-devices-at-the-kernel-level/ protect-devices-at-the-kernel-level/  engagement-have-changed/ engagement-have-changed/  scanners-riddled-with/ scanners-riddled-with/  new-corebot-stealer new-corebot-stealer  researchers-as-fake.html researchers-as-fake.html  (Round up Ashley Madison Hackers) 5MIS

 Submitted  encryption-prevents-it-from-complying-with-u-s-court-order encryption-prevents-it-from-complying-with-u-s-court-order  smartphone-camera-pierce-your-banks-cybersecurity html smartphone-camera-pierce-your-banks-cybersecurity html  hijacked-jeep/ hijacked-jeep/  harddrives.html harddrives.html  companies-400-billion-each-year.html companies-400-billion-each-year.html  bug-information-a-8525?rf= edbt&mkt_tok=3RkMMJWWfF9wsRojuq3OZKXonjHpfsX66OgpU a6g38431UFwdcjKPmjr1YYIRct0aPyQAgobGp5I5FEIT7HYRrhpt6c OXA%3D%3D bug-information-a-8525?rf= edbt&mkt_tok=3RkMMJWWfF9wsRojuq3OZKXonjHpfsX66OgpU a6g38431UFwdcjKPmjr1YYIRct0aPyQAgobGp5I5FEIT7HYRrhpt6c OXA%3D%3D MIS

 Submitted  8/keyraider-ios-malware-steals-over apple- accounts-to-create-free-app-utopia/ 8/keyraider-ios-malware-steals-over apple- accounts-to-create-free-app-utopia/  malware-threat-uses-satellites-to-avoid-detection malware-threat-uses-satellites-to-avoid-detection  -based-android-ransomware-app-discovered-by- researchers based-android-ransomware-app-discovered-by- researchers MIS

 What I noted  works_malwareless/ works_malwareless/  / /  son_made_dumb_security_mistakes_researcher_says/ son_made_dumb_security_mistakes_researcher_says/  bilities-in-whatsapp-web-affect-millions-of-users-globally bilities-in-whatsapp-web-affect-millions-of-users-globally  firmware-backdoor-discovered-into-seagate-nas-drives/ firmware-backdoor-discovered-into-seagate-nas-drives/ MIS

 Search Bar Commands  -  Site:  Filetype:  Inurl:  Intitle:  Intext:  Allinurl:  Allintext:  Search Terms MIS

 Simple one that tells google to not include items that match what comes directly after “-”  Example:  Hacking –ethical – gives all results that include information about hacking as long as they do not include the term “ethical” MIS

 Site: restricts searches to a specific site  Examples  Site:edu – Restricts searches to only sites ending in.edu  Site:temple.edu – Restricts searches to a specific top level site  Site:mis.temple.edu –Restricts searches to a sub-site MIS

 Restricts searches to a specific file type  Examples  Filetype:pdf – Only responds with sites linked to Adobe documents with file extension of pdf  Filetype:xls – Only responds with sites linked to Microsoft spreadsheets documents with file extension of xls  Filetype:xlsx – Only responds with sites linked to Microsoft spreadsheets documents with file extension of xlsx – Excel’s newer file format MIS

 Restricts searches to sites where specific word or phrase is in the url  Examples  inurl:"/root/etc/passwd“  inurl:admin  inurl:j2ee/examples/jsp  inurl:backup MIS

 Restricts searches to sites where specific words are used in the title of a page  Examples  intitle:index.of  intitle:"Test Page for Apache"  intitle:"Apache Status"  intitle:"PHP Explorer" MIS

 Restricts results to documents containing term in the text  Examples  intext:"root:x:0:0:root:/root:/bin/bash"  intext:"SteamUserPassphrase="  intext:"SteamAppUser=" -"username" -"user"  intext:"Usage Statistics for MIS

 Restricts results to those containing all the query terms you specify in the URL  Examples  allinurl:/hide_my_wp=  allinurl:"/main/auth/profile.php"  allinurl:"owa/auth/logon.aspx"  allinurl:forcedownload.php?file= MIS

 Restricts results to those containing all the query terms you specify in the text of the page  Examples:  allintext: /iissamples/default/  allintext: "Please login to continue..."  allintext:"Browse our directory of our members top sites or create your own for free!"  allintext:"fs-admin.php" MIS

 Key search terms  “index of /”  “Please re-enter your password it must match” MIS

 GoogleGuide  html html  Exploit Database   Wikipedia   Google Hacking Volume 2  Testers- Johnny/dp/ /ref=sr_1_1?ie=UTF8&qid= &sr=8-1&keywords=google+hacking Testers- Johnny/dp/ /ref=sr_1_1?ie=UTF8&qid= &sr=8-1&keywords=google+hacking MIS

 Attacker gathers publicly available data  People  Corporate culture  Technologies in use  Terminology  This is an important step as it will help focus later activities MIS

 Maintain an inventory of what you find  Keep a log bog  Create a spreadsheet  Whatever works for you  Record key information  IP Addresses  Target names  Search queries used  Oss in use  Known vulnerabilities  Any passwords found MIS

 Leave room to annotate future information that may be discovered as you go  Examples:  Open ports from port scanning  Search from compromised hosts  Etc… MIS

 Think like a business competitor  Lines of business  Major products or services  Who’s in charge  Officers  VPs  Press Releases  Where are their physical locations  Who are the major competitors in there market place  The same kind of information you would gather for a job interview. MIS

 Don’t just use Google  Bing  Yahoo  Ask  DuckDuckGo  All search engines filter data, but they don’t all filter the same way MIS

 Combine techniques from Google Hacking  Site:temple.edu - MIS

 WayBack Machine  MIS

 Job requirements can often provide insight into technologies in use, and where staffing shortages may result in weaknesses  Check multiple sites  Monster.com  Dice.com  Organizations site  nt/jobs_within.htm nt/jobs_within.htm  Local job sites  MIS

 LinkedIn  Facebook MIS

 Google Maps  MapQuest  Google Earth MIS

 Whois  Database to lookup domain name, IP address and who registered the address  Web based or Command Line  whois google.com  m/whois/index.jsp m/whois/index.jsp MIS

 American Registry for Internet Numbers  Regional Internet Registry for US, Canada, and many Caribbean islands  ARIN is one of five regional registries  Provides services related to the technical coordination and management of Internet number resources MIS

 Results MIS

MIS

 Querying DNS Server  Examples  By domain name  Nslookup temple.edu OR nslookup ns1.temple.edu  Interactive  Nslookup  Followed by prompts  See next slide  Type exit to get out of interactive mode MIS

MIS

 The Dig command is used to gather additional DNS information  May also be used to make zone transfers.  Zone transfers may include details around other assets within an organization.  CAUTION, don’t go further then basic dig command on the next page as you may start triggering alerts in more security focused organizations. MIS

 Example: MIS

 command-examples/ command-examples/  command-examples-usage-syntax/ command-examples-usage-syntax/ MIS

 Dig is available for windows 7  Site:  MIS

   MIS

 Sensepost   BiLE-Suite – The Bi-directional Link Extractor  A suite of perl scripts to find targets related to a given site MIS

 The little green down arrow MIS

 &strip=1 – It’s magic  Right click the cache button and copy shortcut  Paste short cut into notepad and append &strip=1 to the end  Copy and paste into URL  Now you get Google’s cache without leaving a footprint in the target servers logs MIS

 Without &strip=1 MIS

 With &strip=1 MIS

 1 st formal assignment  From Syllabus  (student presentations) Reconnaissance exercise using only publicly available information, develop a profile of a public company or organization of your choosing  You may work in teams, or separately  One to two page Executive Summary  Short (no more then three slides, no welcome slide) presentation  See “Exercise Analysis” tab for more details MIS

? MIS