Reconnaissance Flashcards
Footprinting
Part of reconnaissance, mapping out at a high level what the landscape looks like. During footprinting, you look for any information that might give you some insight into the target - no matter how big or small. Investigating web resources and competitive intelligence, mapping out network ranges, mining whois and DNS, social engineering, email tracking, Google Hacking.
Anonymous Footprinting
Obscure the source of footprinting activities.
Pseudonymous Footprinting
Attributing your actions to someone else when conducting footprinting.
Focus and Benefits of Footprinting
- Know the security posture
- Reduce the focus area (network range, number of targets)
- Identify vulnerabilities
- Draw a network map
Active Footprinting
Requires the attacker to touch the device, network or resource.
Passive Footprinting
Collecting information from public records.
Competitive Intelligence
Information gathered by a business entity about its competitors, customers, products and marketing.
www.attentionmeter.com
Compares website traffic from hosts of different sources and provides traffic data and graphs.
Websites that provide information on company origins and how it developed during the years.
EDGAR database. Hoovers, LexisNexis, Business Wire
Websites that provide company plans and financials
SEC Info, Experian, Market Watch, Wall Street Monitor, Euromonitor
Web Mirroring Tools
Black Widow, GSA Email Spider, NCollector Studio, HTTRACK, GNU Wget
Google Hacking: filetype:type
Searches for files only of a specific type. (DOC, XLS. etc.) Example: filetype:doc
Google Hacking: index of /string
Displays pages with directory browsing enabled. Example: “intitle:index of “ passwd
Google Hacking: info:string
Displays information Google stores about the page itself: Example: info:www.anycomp.com
Google Hacking: intitle:string
Searches for pages that contain the string in the title. Example: intitle: login You can also use allintitle for multiple search strings: Example: allintitle:login password
Google Hacking: inurl:string
Displays pages with the string in the URL. Example: inurl:password For multiple strings use allinurl, Example: allinurl: etc passwd
Google Hacking: link:string
Displays linked pages based on a search term.
Google Hacking: related:webpagename
Shows webpages similar to webpagename
Google Hacking: site:domain or web page string
Displays pages for a specific website or domain holding the search term. site:anywhere.com passwds
Google Hacking: allinurl:tsweb/default.htm
Displays RDP Web pages
Google Hacking Tools
SiteDigger and Metagoofil (searches document meta tags)
History Sites
www.archive.org and Google Cache
Email tracking programs
www.emailtrackerpro.com
www.mailtracking.com
GetNotify
ContactMonkey
Yesware
ReadNotify,
WhoReadMe,
MSGTAG,
TraceEmail and
Zendio
DNS Name Resolvers
Answer DNS requests
DNS Authoritative Servers
Hold the records for a namespace
DNS Record Types - SRV
SRV - Hostname and Ports of servers providing specific services
DNS Record Types - SOA
Start of Authority - identifies the primary name server for the zone.
DNS Record Types - PTR
Maps an IP address to a Hostname
DNS Record Types - NS
Name Servers
DNS Record Types - MX
Email Servers
DNS Record Types - CNAME
Domain name aliases
DNS Record Types - A
Host name to IP address
DNS Poisoning
Changing the entries in DNS cache to point to alternative servers.
Domain Name System Security Extensions (DNSSEC)
DNSSEC is aimed at strengthening trust in the Internet by helping to protect users from redirection to fraudulent websites and unintended addresses. In such a way, malicious activities like cache poisoning, pharming, and man-in-the-middle attacks can be prevented.
DNSSEC authenticates the resolution of IP addresses with a cryptographic signature, to make sure that answers provided by the DNS server are valid and authentic. In case DNSSEC is properly enabled for your domain name, the visitors can be ensured that they are connecting to the actual website corresponding to a particular domain name.
What makes up a DNS SOA record?
Source host, Contact Email, Serial Number, Refresh Time, Retry Time, Expire Time, TTL
Internet Corporation for Assigned Names and Numbers (ICANN)
ICANN manages IP address ranges.
Domain Name Registrants
www.godaddy.com www.register.com, etc.
Regional Internet Registries
- American Registry for Internet Numbers (ARIN) - Canada, parts of the Caribbean and North Atlantic Islands and the United States
- Asia-Pacific Network Information Center (APNIC) - Asia and the Pacific
- Reseaux IP Europeens (RIPE) NCC - Europe, Middle East and parts of Central Asia/Northern Africa
- Latin America and Caribbean Network Information Center (LACNIC) - Latin America and the Caribbean
- African Network Information Center (AfriNIC) - Africa
whois database
Queries the registries and returns information including domain ownership, addresses, locations and phone numbers of domain owners.
Dig command
Like NSLOOKUP but for UNIX/Linux. Basic command structure: dig @server name type
Tracert
Traceroute - tracks a packet across the Internet and provides the route path and transit times. Uses ICMP ECHO packets (UDP datagrams in Linux versions).
ICMP Type 11, Code 0
TTL Expired
ICMP Type 3, Code 13
Administratively Blocked
Trace Route Tools
McAfee Visual Trace (NeoTrace), Trout, VisualRoute, Magic NetTrace, Network Pinger, GEO Spider, and Ping Plotter
Differences between Windows and Linux Trace Routers
Windows uses tracert whereas Linux uses traceroute. Windows uses ICMP, Linux uses TCP
OSRFRAMEWORK
Open source research framework in Python that helps in the task of user profiling by performing open source intelligence.
OSRFRAMEWORK - usufy.py
Verifies if a user profile exists in up to 306 different platforms
OSRFRAMEWORK - mailfy.py
Checks if a user name (email) has been registered in up to 22 different email providers.
OSRFRAMEWORK - searchfy.py
Looks for profiles using full names and other info. Exam may say this queries the OSRFramework platform itself.
OSRFRAMEWORK - domainfr.py
Verifies the existence of a given domain in up to 1567 different registries
OSRFRAMEWORK - phonefy.py
Checks for the existence of phone numbers
OSRFRAMEWORK - entify.py
Looks for regular expressions
Web Spiders
A robot program that automatically traverses the Web’s hypertext structure by retrieving a document, and recursively retrieving all documents that are referenced. Normal Web browsers are not robots, because they are operated by a human, and don’t automatically retrieve referenced documents (other than inline images).
Web robots are sometimes referred to as Web Wanderers, Web Crawlers, or Spiders. These names are a bit misleading as they give the impression the software itself moves between sites like a virus; this not the case, a robot simply visits sites by requesting documents from them.
/robots.txt
Web site owners use the /robots.txt file to give instructions about their site to web robots; this is called The Robots Exclusion Protocol.
It works likes this: a robot wants to vists a Web site URL, say http://www.example.com/welcome.html. Before it does so, it firsts checks for http://www.example.com/robots.txt, and finds:
User-agent: *
Disallow: /
The “User-agent: *” means this section applies to all robots. The “Disallow: /” tells the robot that it should not visit any pages on the site.
Social Engineering Tools
Maltego, Social Engineering Framework
Competitive Intelligence Tools
Google Alerts, Yahoo! Site Explorer, SEO for Firefox, SpyFu, Quarkbase, DomainTools.com
Shodan
The hackers search engine. Designed to help you find specific types of computers (routers, servers, and IOT) connected to the Internet.
Vulnerability Research Databases and Sites
National Vulnerability Database,
SecurityTracker,
Hackerstorm Vulnerability Database,
SecurityFocus
DNS ports
DNS lookups use UDP port 53 and zone transfers use TCP port 53
DNS command to initiate a zone transfer using NSLOOKUP
ls -d domainname
Can be used to check web pages for changes, automatically notifying you when there’s an update:
website-watcher (http://aignes.com )