We have already discussed the terminology and intro part about FOOTPRINTING. In this part we will see about THREATS & METHODOLOGY. Again I should have to tell you guys, "This Blog is for educational purpose, Don't do illegal things. Finally responsible person will be you only".
FOOTPRINTING THREATS
What is Threats?
Threat is nothing but an attacker gathers valuable system level information such as account details,operating system & other soft. versions etc.
Threats are the main basic concept by which attacker will attack using given some mechanisms.
There are some following threats include....
1) Social Engineering
2) System & n/w attack
3) Privacy loss
4) Business loss
FOOTPRINTING METHODOLOGY
This is the main section of footprinting. you will know that how can we gather information? By which tools ? how can we get the particular result? etc
there are several methodology used in footprinting.
1) Internet Footprinting
2) Whois Footprinting
3) DNS Footprinting
4) Network Footprinting
5) Website Footprinting
6) Email Footprinting
These are the main SIX methods by which attacker gain as much as information.
1) Internet Footprinting
-> Search for the target company in a search engine such as google or bing.
-> Attacker will find an internal company's URL by trial & error method.
-> TOOLS to search internal URL
-> Identify a company's private or public website
-> Search for company's information like , Employee details, contact info
-> as well as attacker will use people search , extract archive & mirror website etc.
Tools to extract company's data.
1) Web Data Extractor (http://www.webextractor.com/)
2) Spider foot (http://www.binarypool.com/)
-> use google earth tool to get the location of the place
-> you can find personal information using online people search services.
e.g pipl.com , address.com
-> Gather information from financial services
e.g Google Finance , Yahoo finance
-> Or you can gather company infrastructure details from job posting.
2) WHOIS Footprinting
Whois database are maintained by regional internet registries & contain the personal information of domain owners.
WHOIS lookup tools
Attacker look for
-> Physical location
-> Email address
-> Contact info
WHOIS query returns
-> Domain name details
-> Domain name server
->Netrange
Reginal internet registry
-> AFRNIC
-> ARIN
-> APNIC
WHOIS lookup Tools
1) Samspade( http://samspade.org/)
2) Country whois (http://www.tamos.com/)
WHOIS online Tools
1) Whois (http://tools.whois.net)
2) Geek Whois ( http://www.geektools.com/)
3) Domain tools (http://www.domaintools.com/)
3) DNS Footprinting
DNS Tools
1) Net inspector (http://www.globware.com/)
2) NSlookup ( http://www.kloth.net/)
3) DNS Analyser (http://www.edge-security.com/)
4) DNSMAP (http://www.linuxhaxor.net/)
DNS Online Tools
1) Online DNS tools
2) DNS record (http://network-tools.com/ )
3) Check DNS (http://www.menandmice.com/)
4) NETWORK Footprinting
-> To find the range of IP address.
-> Use ARIN whois database search tool
-> You can find the range of IP address & the subset mast used by the target organization from regional internet registry(RIR).
TRACE OUT
Trace out programs work on the concept of ICMP protocol by use the Time to Live Field i the header of ICMP Packets to discovered the router on the path to a target host.
Trace out Tools
1) 3D Trace route
2) Lariotpra
3) Path Analyser Pro