Tuesday, June 11, 2013

M-1 Footprinting Part 2

once again hi .. sorry for late updating. it's been fantastic thing when u have taken  great work to do.
We have already discussed the terminology and intro part about FOOTPRINTING. In this part we will see about THREATS & METHODOLOGY. Again I should have to tell you guys, "This Blog is for educational purpose, Don't do illegal things. Finally responsible person will be you only".

FOOTPRINTING THREATS

What is Threats? 
Threat is nothing but an attacker gathers valuable system level information such as account details,operating system & other soft. versions etc. 

Threats are the main basic concept by which attacker will attack using given some mechanisms.
There are some following threats include....
1)  Social Engineering 
2)  System & n/w attack
3)  Privacy loss
4)  Business loss

FOOTPRINTING METHODOLOGY 

 This is the main section of footprinting. you will know that how can we gather information? By which tools ?                  how can we get the particular result? etc
there are several methodology used in footprinting. 
1) Internet Footprinting
2) Whois Footprinting
3) DNS Footprinting
4) Network Footprinting
5) Website Footprinting
6) Email Footprinting
These are the main SIX methods by which attacker gain as much as information. 
1) Internet Footprinting
-> Search for the target company in a search engine such as google or bing. 
-> Attacker will find an internal company's URL by trial & error method.
-> TOOLS to search internal URL

-> Identify a company's private or public website 
-> Search for company's information like , Employee details, contact info 
-> as well as attacker will use people search , extract archive & mirror website etc. 

Tools to extract company's data.
1) Web Data Extractor (http://www.webextractor.com/)
2) Spider foot (http://www.binarypool.com/

-> use google earth tool to get the location of the place 
-> you can find personal information using online people search services. 
e.g pipl.com , address.com 
-> Gather information from financial services 
e.g Google Finance , Yahoo finance
-> Or you can gather company infrastructure  details from job posting. 

2) WHOIS Footprinting

Whois database are maintained by regional internet registries & contain the personal information of domain owners.

WHOIS lookup tools

Attacker look for
-> Physical location 
-> Email address
-> Contact info 

WHOIS query returns 
-> Domain name details 
-> Domain name server
->Netrange

Reginal internet registry
 -> AFRNIC
-> ARIN
-> APNIC  

WHOIS lookup Tools 
1) Samspade( http://samspade.org/)
2) Country whois (http://www.tamos.com/)

WHOIS online Tools
2) Geek Whois ( http://www.geektools.com/)
3) Domain tools (http://www.domaintools.com/)

3) DNS Footprinting 

DNS Tools
1) Net inspector (http://www.globware.com/)
2) NSlookup ( http://www.kloth.net/)

DNS Online Tools
1) Online DNS tools 
2) DNS record (http://network-tools.com/ )


4) NETWORK Footprinting

-> To find the range of IP address.
-> Use ARIN whois database search tool 
-> You can find the range of IP address & the subset mast used by the target organization from regional internet registry(RIR).

TRACE OUT 
Trace out programs work on the concept of ICMP protocol by use the Time to Live Field i the header of ICMP Packets to discovered the router on the path to a target host. 

Trace out Tools
1) 3D Trace route 
2) Lariotpra
3) Path Analyser Pro