Website Footprinting

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
7 hours 6 minutes
Difficulty
Intermediate
CEU/CPE
7
Video Transcription
00:00
Hey, everyone, welcome back to the course. So in this video, we're gonna go over a brief introduction to website foot printing. So we'll talk about what website footprint actually is. We also talk about some of the information that we can gather as an adversary and we'll talk about some of the tools that are used for website foot printing.
00:17
Keep in mind that this is not gonna be an all inclusive list of every possible available tool
00:22
for website foot printing. We're just gonna cover some of the common ones that are in use.
00:27
So what is website foot printing? Well, this is basically just monitoring and analyzing the target's website. Uh, on the goal here, again with foot printing, is just gathering information. So we may use things like Web spiders because thes perform automated searches on the target website and they'll collect specific information for us, so it could be information like
00:46
employee names. So maybe the website has a blogger on there
00:49
and were able to identify certain things at certain employees were doing or they've got their executive team listed and were able to identify to start mapping out who is who and who might be, ah, potential target for social media. That's gonna be a good target for us.
01:03
It also helps us identify vulnerabilities. So website footprint allows us to identify What is this? What is the organization currently using
01:11
and what can we exploit?
01:15
And then we can use website nearing as well to make an actual copy of the website of the different pages of the website so we could look at the code itself so we could look at the HTML code itself and identify did maybe a developer hard coats, um, credentials in there. Did they leave some comments in there that might help us identify certain systems in use for certain
01:34
ah, potential issues
01:36
that might, we might be able to exploit in the code. So that's why we would near the website.
01:42
So what kind of information can we actually gather?
01:46
Well, we can get information on the header. So, for example, we could get information like the connection status and content type.
01:53
We could learn the accepted range is We can also look at last modified information the X powered by information, a zwelling, the Web server that's actually in use, and the version of it.
02:02
We can look at the HTML source code itself. And again, as I mentioned, look for any hard coded credentials. We confined potentially contact information of the Web developer or the development team a zwelling, potentially the admin. We could look at the file system structure. How are things actually structured for this particular site?
02:21
We could look at the scripting that that's in use, and we can also look for additional comments
02:25
in that source code to see what kind of other information can we gather.
02:30
We can also learn about things like the file name or how the files are. Actually structure. The file system is actually structured. We could learn about the past. We could potentially learn about database fields. Aziz Well, as other information that can help us query that database,
02:46
we could also potentially find things like the operating system in use. We can learn about things like contact information as we talked about email addresses, content management system or CMS information. Azaz. Well as learning about the cookies, we can review the cookie information, so
03:01
it may that may give us some information about, like the software that's in use or just the behavior of that software
03:07
A Zwelithini scripting platforms that might be used.
03:12
So what are some of the tools that we can actually use for website foot printing? What? We've got tools like birth suite, which is a very, very common one. We've also got things like firebug grabs it and H t track,
03:23
as well as website informer. And HD track will actually do a demonstration video a little later on in this module.
03:31
So just a quick question here for you when performing footprint of websites, which is the following information. Can you actually gather? Can you gather information about the operating system, the file system structure? Or can you gather information about the CMS or content management system?
03:47
Alright, This one again was kind of a trick one, right? It's all of them. We can gather information about the operating system that might be in used. We could gather information around things like subdirectories parameters. We can gather scripting information. We can gather file system information. We could learn about the past. We could learn about potential database fields. So then we can query that database.
04:06
We could learn about the content management system,
04:09
the contact information potentially about the Web developer or the admin. We can potentially get credential information.
04:16
The software that's being used across the board on the site. So just a lot of information we could potentially gather from website foot printing.
04:24
So in this video, we talked about WEBS Website Foot printing actually is. So again, just always think when you hear foot printing, always think of gathering information that's gonna help you a lot if you go take the C E H exam.
04:34
We also talked about some of the information that we can gather again. Things like the file system, structure, information, things like from the HTML code. We could learn potentially credential information or just comments by the developer that can help us identify potential vulnerabilities. And we learned about some of the common tools for website foot printing, for example, burp sweet and H T track, which again?
04:54
We'll go over a brief demonstration in this course
Up Next