Chapter 2 Reconnaissance: Footprinting Flashcards

1
Q

Two types of footprinting

A

Active and Passive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Passive Footprinting

A

Accessing publicly available information about a target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Active Footprinting

A

Accessing information about a target using interaction with the organisation; social engineering, human interaction etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Passive Information Gathering - Competitive Intelligence

A

Information legally gathered by a business entity about its competitors customers, products and marketing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Passive Information Gathering - Pseudonymous Footprinting

A

Gathering information from online sources posted by someone from the target but under a different name.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Active Information Gathering - Social Engineering

A

Information gathering using phone calls, face to face interaction, social media interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Passive Information Gathering - Dumpster Diving

A

Looking in the trash for information (passwords, filenames etc) written on paper or printouts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Using Search Engines and the internet

A

Usual Search Engines; Google, Yahoo, Bing, DuckDuckGo Use Google Alerts to monitor a target and get alerts for each new entry indexed by google.

Netcraft - Online tool used to obtain information not usually intended for public disclosure; web server version, IP address, subnet data, OS info, subdomain info etc.

Job Boards - Disclosure of company infrastructure and software estate.

Archive.org - Archived copies of websites/history

Google Cache - Archived copies of websites

Website Watcher at http://aignes.com checks web pages automatically for changes alerting you when they do (exam tip)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Google Hacking

A

Using operators and syntax to fine tune searches to find information often unintentionally publicly available on the internet. Google Hacking Database is a handy tool which regularly catalogues search strings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Website Foorprint Tools to capture headers, cookies, connection status, content type and web server information

A
  • Burpsuite
  • Firebug
  • Website Informer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Web Mirroring/Copying Tools (Passive Footprinting)

A
  • HTTrack
  • Black Widow
  • WebRipper
  • Teleport Pro
  • GNU Wget
  • Backstreet Browser
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Four main focuses and benefits of footprinting according to the EEC

A
  • Know the security posture (footprinting helps make this clear)
  • Reduce the focus area (network range, number of targets etc)
  • Identify vulnerabilities
  • Draw a network map

EXAM TIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Target Alerts

A

Google, yahoo and twitter offer alerting so you can get emails/messages whenever new content regarding your target is found.

EXAM TIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Email Tracking Information and Tools

A

Email headers can provide good footprinting information about a target such as IP address, physical locations, even links visited by the recipient, OS information and sometimes how long a recipient spent reading the email.

Email Tracking websites and tips

  • Using read reciepts
  • www.emailtrackerpro.com
  • www.mailtracking.com

Email tracking tools include

  • GetNotify
  • ContactMonkey
  • Yesware
  • Read Notify
  • WhoReadMe
  • MSGTAG
  • Trace Email
  • Zendio
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DNS Information

A

DNS is a naming system for computers that converts human-readable domain names into computer readable IP-addresses and vice versa.DNS uses UDP port 53 to serve its requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DNS Record Types

A
  • A (address)—Maps a hostname to an IP address
  • SOA (Start of Authority)—Identifies the DNS server responsible for the domain information
  • CNAME (canonical name)—Provides additional names or aliases for the address record
  • MX (mail exchange)—Identifies the mail server for the domain
  • SRV (service)—Identifies services such as directory services
  • PTR (pointer)—Maps IP addresses to hostnames
  • NS (name server)—Identifies other name servers for the domain

EXAM TIP

17
Q

The Domain Name System Security Extensions (DNSSEC)

A

DNSSEC was created in 1999 to help comnat DNS poisoning and is a suite of IETF (Internet Engineering Task Force) specifications for securing certain kinds of information provided by DNS.

EXAM TIP

18
Q

DNS Footprinting tool - WHOIS

A

Provides domain ownership information, including registrant and administrative names, contact numbers and DNS server names

EXAM TIP

19
Q

DNS Footprinting tool - nslookup

A

WIndows command to display default DNS server and associated IP addresses.

  1. Enter nslookup at the command line
  2. Type server (using the IP address of the SOA and press ENTER
  3. Type set type=any and press ENTER
  4. Type ls -d domainname.com (where domainname.com is the name of the zone) and press ENTER

You’ll recive an error code if the administrator has secured the domain or you’ll get a copy of the zone transfer

EXAM TIP - You’ll need to know nslookup syntax very well and how to get into interactive more

20
Q

Network Footprinting

A

Use tracert or ping to get targets IP ranges on a windows machine. Using linux, you’d use traceroute NOT tracert, and remember a route to a target can change at anytime.

Windows is ICMP whereas LINUX is UDP

EXAM TIP

21
Q
A