< All Penetration Testing and Ethical Hacking (Archive) Notes

Chang Tan Lister | Penetration Testing and Ethical Hacking | Module 02 - Footprinting

By: Chang Tan Lister | Related Course: Penetration Testing and Ethical Hacking (Archive) | Published: February 13, 2017 | Modified: February 13, 2017
Join Cybrary

Notepadnslookup

nslookup lab is really useful. Type ’help’ to go into options beyond the standard settings


NotepadOverview

FOOTPRINTING DETAILED

Use disclosed information, paint a larger picture before attacking your target

 

INTERNAL

  1. Internal DNS
  2. Private Websites
  3. ”Dumpster Diving”
  4. ”Shoulder Surfing”, literally visual snooping
  5. Eavesdropping, (literally as well)

EXTERNAL

  1. 1. Phone numbers
  2. 2. Network (Types, Implementation)
  3. 3. Public websites
  4. 4. Email Header

PRIORITY

  1. google
  2. social networks (frequency of updates)
  3. whois
  4. dns (structure)

NETWORK BLOCKS

  1. IP Blocks
  2. Network Blocks (Do they have the entire IP block for themselves?)
  3. web server content (HTML? We can use DirBuster on it)
  4. Source Code of their public website
  5. Website mirroring
  6. OS Detection

PUBLIC

  1. DB
  2. Other search engines (not incl. Google)
  3. Google Earth (pop the addr from WHOIS/other into it)
  4. ”People Sites”, LinkedIn. Learn their skillsets and backgrounds.
  5. Financial web (fin company)
  6. Job sites (They are looking for X as a expert in X)
  7. Google Alerts website (emailed to ourselves so we dont have to constantly search)
  8. Internet Archives (MySpace)
  9. Web monitoring websites
  10. Patent/Trademark information
  11. CUstomer service information
  12. Press releases

Don’t get lost into the tools and techniques. ALways look at the big pictures and every option available to you.

 


NotepadPing lab

Change the bytes of the data to trigger replies versus the replies being ignored.

 

This is a ping test on WINDOWS, NOT Linux.


< All Penetration Testing and Ethical Hacking (Archive) Notes
Join Cybrary

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel