Download presentation
Presentation is loading. Please wait.
1
FootPrinting CS391
2
Overview What is footprinting? Main steps of footprinting.
3
What is Footprinting? Create a complete profile of an organization’s security posture using a set of tools and techniques. The profile usually includes detailed information about IP addresses and blocks, range of domain names, remote access, intranet structure, systems connected to the Internet …etc.
4
Main Steps Usually, the process involves six steps:
Determine scope of activities. Get proper authorization. Collect publicly available information WHOIS and DNS enumeration DNS Interrogation Network Reconnaissance
5
Determine Scope of Activities
Organization networks are usually very large. One focuses only on sub-targets.
6
Get Proper Authorization
Try to gain access to the system using a proper account.
7
Publicly Available Information
Company websites and pages. Physical location. Related organizations. Privacy, security policies adopted. Disgruntled employees.
8
Where can I find the required information?
9
ICANN Structure
10
Google Information
11
Nesma Information
12
WHOIS and DNS Enumeration
Internet domain names. IP address numbers. Protocol parameters and port numbers.
13
DNS Interrogation: Many people use nslookup for this purpose:
14
nslookup
15
Types of Queries Type A A simple query for the IP address corresponding to DNS Type CNAME A given host can have several DNS names. One of these is the canonical or reference name. Type MX A mail exchanger query, to discover the real name of the corresponding mail server Type HINFO An HINFO query. This is only useful if the DNS domain administrator has bothered to create the relevant records and keep them up to date.
16
Network Reconnaissance
Traceroute is the tool.
17
Superscan:
18
Supersacn
19
Enumerate
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.