Friday, June 14, 2013

M-1 Footprinting Part 3

he guys .. how's it part 1, part 2. I hope you like it. If u wanna detail knowledge regarding footprinting pls use internet. in this field internet is our teacher, friend and all :). so be friendly and hungry about knowledge.
It's been very tough part to tell you this thing in deeply. And in this part I will finalize the footprinting section.
In part 2 we have seen only threats and it's type. In this section we can see the countermeasures and footprinting Pentest. But before we will see remaining portion of threat's. 

5) WEBSITE Footprinting

Web mirroring tools allows you to download a website to a local directory, building recursively all directories   HTML Images, Flash , Videos from the server to your computer.

Website Mirroring Tools  
1)HTTrack Website Copier (http://ww2.htttrack.com/
2)KEEPNI (http://www.keepni.com/)

Mirroring Entire Website tools 
1) Wget (http://www.gnu.org/)
2) teleport pro (http://www.tenmax.com/)

-> Extract website information from http://archive.org/index.php 
-> as well as you can monitor web updates using website watcher. 

6) EMAIL Footprinting

Email Tracking Tools
1) email tracker pro (http://www.emailtrackerpro.com/)
2) didtheyreadit (http://www.didtheyreadit.com/)
4)Trout(http://www.foundstone.com/)

Now we will see some footprinting tools....
1) Prefix
2) Netmask
3) Maltego

I'm not giving here that much tools sorry for that. except you guys can tell me those name. then I will know that you guys are actually reading my blog. :p :). not joking it's ur assignment


FOOTPRINTING COUNTERMEASURE

Now will discus about the countermeasure. what should we do for preventing this type attack. Yes this is also one type of attack . but sorry we can't get to know about this..here this methods.
-> Configure routers to restrict the footprinting request.
-> Configure web server to avoid information leakage & disable unwanted protocols.
-> Lock the ports with the suitable firewall configuration. 
-> Use an IDS.
-> Evaluate the information beofore publishing it on the website / Internet .
-> Remove any sensitive information found
-> Prevent search engine form caching a web pages & use anonymous registration services.

FOOTPRINTING PENTEST

It's always been toughest part in cyber security field. Pen testing gives you all details. 
In this footprinting determine organization's publicly available information on the internet such as network architecture , O.S , Applications e.t.c 

Te tester attempts to gather as much information as possible about the target organization from internet & other public accessible source.

Pen test usually get  proper authorization & then after declare the scope of work. Pen tester performs some footprinting technique to gather the information like internet footprinting using LINK EXTRACTOR e.t.c 
Or WHOIS footprinting using SMART WHOIS e.t.c or Competitive intelligence using tools such as SPAN e.t.c e.t.c e.t.c e.t.c at t  he end pen testing document all the file findings.

Here we complete ore first module Footprinting. SO how is this guys.. Fun na ? ust enjoy this section ..
One more thing pls this knowledge for EDUCATIONAL purpose .. Don't do any illegal thing..
Be a smart WHITE HAT HAKCER.. :) and BE HAPPY .