MOD2: Footprinting and Recon Flashcards
Information obtained in footprinting.
- Organizational info –> ex Employee details is most important
- Network Info –> DNS, IP addresses etc,
- System info –> users and pws, OS, location of web servers
Footprinting using Google Hacking techniques:
What type of information does [cache:] provide?
Displays the web pages stored in the Google cache.
Footprinting using Google Hacking techniques:
What type of information does [link:] provide?
Lists web pages that have links to the specified web pages.
Footprinting using Google Hacking techniques:
What type of information does [related:] provide?
Lists web pages that are similar to the specified web pages.
Footprinting using Google Hacking techniques:
What type of information does [info:] provide?
Presents some information that Google has about a particular web page.
Footprinting using Google Hacking techniques:
What type of information does [site:] provide?
Restricts the results to those websites in the given domain.
Footprinting using Google Hacking techniques:
What type of information does [intitle:] provide?
Restricts the results to documents containing the search keyword in the title.
Footprinting using Google Hacking techniques:
What type of information does [allintitle:] provide?
Restricts the results to those websites containing all the search keywords in the title.
Footprinting using Google Hacking techniques:
What type of information does [allinurl:] provide?
Restricts the results to those containing all the search keywords in the URL.
Footprinting using Google Hacking techniques:
What type of information does [inurl:] provide?
Restricts the results to documents containing the search keyword in the URL.
Footprinting using Google Hacking techniques:
What type of information does [location:] provide?
Finds information for a specific location.
You can do Google search queries for VoIP and VPN footprinting.
True / False.
True.
You can check out Google Dork, where they provide predefined search queries and the description for each.
Name 1 meta search engine that uses other search engines (Google, Bing, etc) to produce their own results from the internet.
“Startpage” or “Metager”.
What is a FTP (File Transfer Protocol) search engine?
A global File Search Engine that lets you search images, videos, music, folders, disc images, compressed files, regular files.
People in today’s day are still using FTP search engines to send and receive files however it’s not as secure as today’s security products.
What information can you find at Netcraft.com?
Top level domains (TLD) and sub-domains.
What 2 tools are useful to enumerate on LinkedIn to find employees of target companies along with their job titles?
“theHarvester” and “Email Spider”.
What is an example of a whaling attack?
Going after the executive.
FYI: Attackers can go through Google to find financial services details for the target company.
What is the Deep Web?
It consists of web pages and contents that ARE HIDDEN and UNINDEXED and cannot be located using traditional web browsers and search engines.
It can be accessed by the Tor Browser and the WWW Virtual Library.
What is the Darknet?
It is a subset of the deep web that enables ANYONE to navigate ANONYMOUSLY without being traced.
It can be accessed by browsers like Tor Browser, Freenet, GNUnet, I2P, and Retroshare.
What kind of information can attackers find on the deep and dark net?
They can use searching tools such as Tor Browser and ExoneraTor to gather confidential information about the target.
This includes: Social Security Numbers (SSNs), credit card details, passport information, identification card details, medical records, social media accounts, etc.
Name 2 sites that help determine the OS by finding connected devices (such as routers, servers, IoT, etc).
“SHODAN” and “Censys”.