Académique Documents
Professionnel Documents
Culture Documents
Countermeasures
Version 6.1
Mod le III
Module
Footprinting
Scenario
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
News
Source: http://www2.nysun.com/
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
News
Copyright by EC-Council
EC-Council Source: http://blogs.zdnet.com/ All Rights Reserved. Reproduction is Strictly Prohibited
Module Objective
Footprinting: An Introduction
Footprinting steps
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Module Flow
Competitive Intelligence
Reconnaissance Phase
Gathering
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Revisiting Reconnaissance
1
Reconnaissance
Reconnaissance refers to the
preparatory phase where an
attacker seeks to g
gather as much
information as possible about a
5 2 target of evaluation prior to
Clearing Tracks Scanning launching an attack
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Defining Footprinting
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Why is Footprinting Necessary
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Information which Attackers
Seek
Internet Intranet
t a et
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
I f
Information
ti Gathering
G th i
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Information Gathering
Methodology
Unearth initial information
Most of this information is fairly easy to get, and within legal limits
One easy way to check for sensitive information is to check the HTML source
code of the website to look for links, comments, and Meta tags
Typing
i the
h company name iin any search
h engine
i can retrieve
i iits d
domain
i name
(such as targetcompany.com)
Direct requests
q to
o company
o p y for
o information
o o andd searching
g DNS
Sddatabases
b are
commonly used open source footprinting techniques
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Finding a Companys URL
Search
Sea c for
o a co
companys
pa y s U
URL us
using
g a sea
search
c eengine
g e suc
such as Goog
Googlee
Type the companys name in the search engine to get the companys
URL
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Public and Private Websites
You may find an internal companys URL by trial and error method
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
www.archive.org
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
www.archive.org (contd)
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Google Search for Companys Info
Extract the companys infrastructure details by scrolling through companys news and press
releases
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
People Search
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Yahoo People Search
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Satellite Picture of a Residence
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Best PeopleSearch
http://www bestpeoplesearch com/
http://www.bestpeoplesearch.com/
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
People-Search-America.com
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Switchboard
http://www.switchboard.com/
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Anacubis
http://www.i2.co.uk/anacubis/
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Google Finance
http://finance.google.com/finance
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Yahoo Finance
www.finance.yahoo.com
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Footprinting Through Job Sites
Job requirements
Employee
p y p profile
Hardware information
Software information
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Footprinting Through Job Sites(contd)
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Footprinting Through Job Sites(contd)
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Passive Information Gathering
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Competitive
Intelligence Gathering
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Competitive Intelligence
Gathering
Business moves fast. Product cycles are measured in months, not
years. Partners become rivals quicker than you can say breach of
contract. So how can you possibly hope to keep up with your
competitors if you can't keep an eye on them?
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Competitive Intelligence Gathering
(
(contd)
)
Cognitive hacking:
Single source
Multiple source
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Why Do You Need Competitive
Intelligence
Compare
p yyour p
products with yyour competitors
p offerings
g
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Competitive Intelligence
Resource http://www.bidigital.com/ci/
http://www bidigital com/ci/
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Companies Providing
Competitive Intelligence Services
Carratu International
http://www.carratu.com
CI Center
http://www.cicentre.com
Lubrinco
http://www.lubrinco.com
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Carratu International
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
CI Center
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Competitive Intelligence - When Did
p y Begin?
This Company g How Did It Develop?
p
Laser D for Annual Reports to Stockholders & 10-Ks (Reference Room - workstation
#12)
EDGAR database - for 10-K and other report filed with the SEC (also Business Database
Selection Tool)
Mergent Online - company history and joint ventures (Business Database Selection Tool)
ORION, UCLA's Online Library Information System (Business Database Selection Tool)
Enter Search Terms: general electric [for books on GE] , click on button: Search
Subject Words
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Competitive Intelligence - Who
Leads This Company
Hoover's Online - Company Profile includes Key People. (Business Database Selection
Tool)
Also in print as Hoover's Handbook of American Business (Reference - HG 4057 A28617)
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Competitive Intelligence - What
Are This Company
Company'ss Plans
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Competitive Intelligence - What Does
Expert Opinion Say About The Company
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Competitive Intelligence Tool:
Trellian
Trellian compiles and analyzes Internet usage statistics to create a
powerful Competitive Intelligence tool that no business should be
without
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Competitive Intelligence Tool:
Web Investigator
Web Investigator checks sources, public
databases and proprietary
databases, proprietar search databases
databases, and
allows to download and view reports of records
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Web Investigator: Screenshot
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
RelevantNoise
RelevantNoise
R l tN i isi a subscription-based
b i ti b d online
li search
h service
i ththatt mines
i social
i l
media for business intelligence
It quickly says about your brands across social media and their impact
It helps a business to monitor the blog buzz about its products, services, and
companys reputation, and also those of its competitors
It also assesses the relative influence of bloggers using factors such as their
tenure, how often they post, and the number of incoming links to help you
d t
determine
i h how much h th
the opinions
i i really
ll matter
tt
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
RelevantNoise: Screenshot
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Reputica Dashboard
You can see how your rating has changed over time, and how it is
compared with other companies or competitors
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Reputica Dashboard: Screenshot
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Defending your Reputation on
the Internet
~ Blogs, forums and other online chatter can
make or break a company's reputation
An unsavory connection from your past
An annoying link to your name that's dragging down your
career
A spicy quote you tossed off to a reporter that you wish you
could take back
~ Reputation management companies can help you
delete, erase, ungoogle damaging information from the
webb
http://www.defendmyname.com
http://www.reputationdefender.com
http://www.visibletechnologies.com
h // i ibl h l i
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
TruCast
http://www.visibletechnologies.com
p // g
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
http://www.visibletechnologies.com
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
http://www.reputationdefender.com
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
http://www.defendmyname.com
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
MyReputation
Blogs
Milli
Millions off additional
ddi i l sites
i on the
h ""open IInternet""
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
http://www.myreputation.com
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
http://www.radian6.com
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
http://www.reputica.com
Reputica
Dashboard
provides one
online source of
information
about your
reputation with
links
Based on search of
literally thousands
of sources of
information both
offline and online
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
http://www.buzzlogic.com
Blogs Influence Purchases more than Social Sites, Blogs can have more impact
on purchase
h d
decisions
i i than
h social
i l networks,
k a new study d fifinds.
d
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
F t i ti
Footprinting Tools
T l
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Footprinting Tools
Whois
Wh i
Nslookup
ARIN
Neo Trace
VisualRoute Trace
SmartWhois
eMailTrackerPro
Website watcher
Google Earth
GEO Spider
HTTrack Web Copier
E-mail Spider
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Sensepost Footprint Tools - 1
www.sensepost.com
BiLE.pl
p
BiLE leans on Google and HTTrack to automate the collections to and from the
target site, and then applies a simple statistical weighing algorithm to deduce which
websites have the strongest relationships with the target site
Command:
perl BiLE.pl www.sensepost.com sp_bile_out.txt
BiLE-weigh.pl
BiLE-weigh, which takes the output of BiLE and calculates the significance of each
site found
Command:
perl bile-weigh.pl www.sensepost.com sp_bile_out.txt.mine out.txt
tld-expand.pl
The tld-expand.pl script is used to find domains in any other TLDs
Command:
perl exp-tld.pl [input file] [output file]
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Sensepost Footprint Tools - 2
www.sensepost.com
vet-IPrange.pl
The results from the BiLE-weigh have listed a number of domains with their
relevance to the target website
Command:
perl
p vet-IPrange.pl
g p [ [input
p file]
] [
[true domain file]
] [
[output
p file]
]
<range>BiLE-weigh.pl
qtrace.pl
qtrace is used to plot the boundaries of networks. It uses a heavily modified
traceroute using a #custom compiled hping# to perform multiple traceroutes to
boundary sections of a class C network
Command:
perl qtrace.pl [ip_address_file] [output_file]
vet-mx.pl
The tool performs MX lookups for a list of domains, and stores each IP it gets in a
file
Command:
perl vet-mx.pl [input file] [true domain file] [output file]
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Sensepost Footprint Tools - 3
www.sensepost.com
jarf-rev
jarf-rev is used to perform a reverse DNS lookup on an IP range. All reverse entries
p y on the screen
that match the filter file are displayed
Command:
perl jarf-rev [subnetblock]
perl jarf-rev 192.168.37.1-192.168.37.118
jarf-dnsbrute
The jarf-dnsbrute script is a DNS brute forcer when DNS zone transfers are not
allowed. jjarf-dnsbrute will p
perform forward DNS lookups
p using
g a specified
p domain
name with a list of names for hosts
Command:
perl jarf-dnsbrute [domain_name] [file_with_names]
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Tool: Big Brother
Big
g Brother uses a client-server architecture
combined with methods which push and pull data
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Tool: BiLE Suite
Alchemy Network
Alchem Net ork Tools contains the follo
following
ing net
network
ork
utilities:
Ping
Traceroute
NSLookup
Whois
HTTP/HTTPS request sender
SNMP request sender
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Alchemy Network Tool:
Screenshot
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Tool: Advanced Administrative Tool (AA)
It combines 12 utilities:
Port Scanner
Proxy Analyzer
RBL Locator
L
CGI Analyzer
Email Verifier
Links Analyzer
N t
NetworkkMMonitor
it
Process Monitor
Whois
System Info
R
Resource Viewer
Vi
Registry Cleaner
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Advanced Administrative Tool:
Screenshot
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Tool: My IP Suite
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
My IP Suite: Screenshot 1
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
My IP Suite: Screenshot 2
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Whois
o s Tools
oo s
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Wikto Footprinting Tool
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Tool: Whois Lookup
With whois lookup, you can get personal details and contact
i f
information
ti about
b t th
the d
domaini
For example, www.samspade.com
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Whois
Registrant:
targetcompany (targetcompany-DOM)
# Street Address
dd
City, Province
State, Pin, Country
Domain Name: targetcompany.COM
Administrative Contact:
Surname, Name (SNIDNo-ORG) targetcompany@domain.com
targetcompany (targetcompany-DOM) # Street Address
City, Province, State, Pin, Country
Telephone: XXXXX Fax XXXXX
Technical Contact:
Surname, Name (SNIDNo-ORG) targetcompany@domain.com
targetcompany (targetcompany-DOM) # Street Address
City, Province, State, Pin, Country
Telephone: XXXXX Fax XXXXX
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Tool: ActiveWhois
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Tool: LanWhois
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
LanWhois: Screenshot
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Tool: CountryWhois
It is especially focused on IP
IP-to-country
to country identification and does not need to
contact external Whois servers
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
CountryWhois: Screenshot
The following result show the product most probably uses a reverse lookup to resolve the IP
addresses and manages to accurately identify the country of origin
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Tool: WhereIsIP
Features:
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
WhereIsIP: Screenshot
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Tool: ip2country
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Ip2country: Screenshot
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Tool: CallerIP
Features:
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
CallerIP: Screenshot 2
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
CallerIP: Screenshot 3
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Web Data Extractor Tool
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Web Data Extractor Tool:
Screenshot
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Online Whois Tools
www.samspade.org
www.geektools.com
www.whois.net
www.demon.net
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Tool: What is MyIP
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
DNS Information
Extraction
i Tools
l
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
DNS Enumerator:
Google DNS Mine Script
Google_DNS_Mine
The script identifies and retrieves all the sub domains and DNS
names of a particular web site
Subdomains
Affiliates
Users
Similar
i il d domains
i
Email addresses
Netblocks
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
SpiderFoot: Screenshot 1
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
SpiderFoot: Screenshot 2
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
SpiderFoot: Screenshot 3
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Tool: Nslookup
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Nslookup: Screenshot
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Extract DNS Information
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Extract DNS Information:
Snapshot
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Types of DNS Records
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Tool: Necrosoft Advanced DIG
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Tool: Expired Domains
Expired
E i dD Domains
i enable
bl to search
h through
h h a li
list off expiring
i i d domain
i
names by keyword, domain, character length, and other criteria
The pprogram
g can download an updated
p list of domain names with the
click of a button
Multiple filter rules can be created to find domain names that are of
interest
List can be printed, exported, and selected and domain can be saved
in a draft list
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Expired Domains: Screenshot
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Tool: DomainKing
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Tool: Domain Name Analyzer
The program is easy to use with a pleasant interface and online help
It supports all global and country code top level domains as well as
trademark lookup, favorite registrar configuration, and payment
status lookup
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Domain Name Analyzer:
Screenshot
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Tool: DomainInspect
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
DomainInspect: Screenshot
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Tool: MSR Strider URL
Tracer
MSR Strider URL Tracer enables to scan a domain name to see the third party
domains that it serves content from and/or whether the site is being redirected
It also includes a feature that allows to generate a list of common typos based
on the
th ddomaini name
It scans and browses the list of generated names in order to spot domains that
capitalize
i li on iinadvertent
d URL misspellings
i lli ((typo-squatting)
i )
S d U
Strider URL Tracer can also
obbe veryy useful for
o webmasters
b o
or site o
owners who
o
want to track down typo-squatting violations
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
MSR Strider URL Tracer:
Screenshot
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Tool: Mozzle Domain Name Pro
Mozzle is an advanced domain name search tool that features flexible and
customizable domain name creation patterns
Mozzle also includes Net Speak; a feature that generates alternative spellings to
domain names, such as "4kids" for the domain name "forkids
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Domain Research Tool (DRT)
Domain Research Tool is an application that can be used on the initial enumeration of a
target network
Functions of DRT:
Finds
i d ddomains
i
Gathers search engine traffic information
Enumerates backlinks
Establishes page ranking statistics with a number of search
engines
g
Features:
BULK Scanning support
Powerful
P f lPProxy S
Supportt
IDN Support
Typo Generator
Portfolio Management support
Watch List
Type-in Domain Finder
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Domain Research Tool (DRT):
Screenshots
DRT provides the expiry details for the target domain and that it indeed does resolve
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Tool: Domain Status Reporter
Supported
pp domains include .com, .net, .org,
g .edu, .info,
and .biz
In addition
add t o to status, p
program
og a ddisplays
sp ays eexpiration
p at o date
and last updated date and created date
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Tool: Reggie
Reggie is an easy to use and flexible domain name checker with a built in 80,000 word
E li h di
English dictionary
ti
It uses both HTTP and Whois searches and works through firewalls and HTTP
authorization
th i ti
Reggie offers 5 automated search options including a Word List Builder which can build
a list using a combination of 4 different words
It also supports "Sounds Like"using Soundex and Metaphone functions to find available
domain names
Advanced users can also specify which servers to use for each domain extensions
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Reggie: Screenshot
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Locating Network Range
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Locate the Network Range
ARIN (American
Information g y of Internet
Registry
Sources: Numbers)
Traceroute
Hacking NeoTrace
Tool: Visual Route
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
ARIN
http://www.arin.net/whois/
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
ARIN: Screenshot
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
ARIN Whois Output: Screenshot
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Traceroute
It reveals
l th
the path
th IP packets
k t travel
t l between
b t two
t systems
t by
b sending
di
out consecutive sets of UDP or ICMP packets with ever-increasing
TTLs
Routers with reverse DNS entries may reveal the name of routers,
network affiliation,
affiliation and geographic location
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Traceroute: Screenshot
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Trace Route Analysis
Traceroute is a program that can be used to determine the path from source
to destination
traceroute 1.10.10.20,
1 10 10 20 second to last hop is 1.10.10.1
1 10 10 1
traceroute 1.10.20.10, third to last hop is 1.10.10.1
traceroute 1.10.20.10, second to last hop is 1.10.10.50
traceroute 1.10.20.15, third to last hop is 1.10.10.1
traceroute 1.10.20.15,
1 10 20 15 second to last hop is 1.10.10.50
1 10 10 50
By putting this information together, you can diagram the network (see the next
slide)
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Trace Route Analysis
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Tool: 3D Traceroute
3 Traceroute is a full-blown
3D
three-dimensional traceroute
program that allows you to
visually monitor the Internets
connectivity
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
3D Traceroute: Screenshot 1
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
3D Traceroute: Screenshot 2
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Tool: NeoTrace (Now McAfee
Visual Trace)
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
NeoTrace: Screenshot
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Tool: VisualRoute Trace
It shows the
connection path
and the places
where bottlenecks
occur
www.visualware.com/download/
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
VisualRoute Trace: Screenshot
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Path Analyzer Pro
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Path Analyzer Pro: Screenshot 1
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Path Analyzer Pro: Screenshot 2
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Tool: Maltego
Forensic investigations
Law enforcement
Intelligence operations
Identity fraud investigation
Identity verification processes
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Maltego: Screenshot
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Layer Four Traceroute
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Prefix WhoIs Widget
Prefix WhoIs widget displays the number of prefixes present within the
global Internet routing table and allows the user to submit queries using a
familiar Dashboard interface
It also displays some useful information, such as the size of the overall table
measured d in a number
b off prefixes
f
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Prefix WhoIs Widget: Screenshot
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Tool: Touchgraph
www.touchgraph.com
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Touchgraph: Screenshot
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Tool: VisualRoute Mail Tracker
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Tool: eMailTrackerPro
Mail Tracking is a tracking service that allows you to track when your mail was read, for
how long and how many times
times, and the place from where the mail has been posted
posted. It also
records forwards and passing of sensitive information (MS Office format)
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
E-mail Spiders
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
E-Mail Spiders
All they need is a web spidering tool picking up e-mail addresses and
storing them to a database
If these
th tools
t l run th
the entire
ti night,
i ht th
they can capture
t h
hundreds
d d off
thousands of e-mail addresses
Tools:
Web data Extractor
1st E-mail Address Spider
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Tool: 1st E-mail Address Spider
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Power E-mail Collector Tool
It can collect up to 750,000 unique valid email addresses per hour with a Cable/DSL
connection
It only
l collects
ll t valid
lid email
il addresses
dd
Just enter a domain that you want to collect email addresses from and press the start button.
The program opens up many simultaneous connections to the domain and begins collecting
addresses
dd
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Power E-mail Collector Tool:
Screenshot
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Locating Network
Activity
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Tool: GEOSpider
GEO Spider
d hhelps
l you to d detect, identify,
d f and
d monitor
your network activity on the world map
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
GEOSpider: Screenshot
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Tool: Geowhere
It can also seek information from country specific search engines for
better results
Newsgroups Search
Mailing list finder
Eas Web Search
Easy
Daily News
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Geowhere: Screenshot
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
GoogleEarth
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
GoogleEarth (contd)
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
GoogleEarth (contd)
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Search Engines
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Kartoo Search Engine
www.kartoo.com
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Dogpile (Meta Search Engine)
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Dogpile (Meta Search Engine): Screen Shot
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Tool: WebFerret
WebFerret searches the web quickly and thoroughly by instantly submitting the search query to
multiple search engines
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
robots.txt
All search
h engines
i comply
l to robots.txt
b
You might
Y i h not want private
i d
data and d sensitive
i i areas off a
site, such as script and binary locations indexed
~ Robots.txt
b ffile
l
User-agent: *
Disallow: /cgi-bin
Disallow: /cgi
/cgi-perl
perl
Disallow: /cgi-store
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
How do I remove a page from Google's
search results?
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Tool: WTR - Web The Ripper
WTR - Web The Ripper 2 allows to select and download files that are linked
f
from a specified
ifi d web
b page
It analyzes
y input
p URL and then displays
p y a list of all downloadable files (images,
g ,
html, programs, mp3 etc.) allowing to select all or individual files
The files are downloaded to a folder of choice and the program can also be
configured to automatically launch anti-virus scanner
In addition,
addition you can specify an extension filter to limit downloads to the
specified file types
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
WTR - Web The Ripper:
Screenshot
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Tool: HTTrack Web Site Copier
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Tool: Website Watcher
Website watchers can be used to get updates on the website
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Website Watcher: Screenshot 1
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Website Watcher: Screenshot 2
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Website Watcher: Screenshot 3
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
How to Fake Websites
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
How to Create Fake Website
Example: www.xsecurity.com
Register
g a domain name which is similar to
the real websites domain name
Example:
Original website URL: www.xsecurity.com
Fake website URL: www.x-security.com
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Tool: Reamweaver
When a visitor visits a page on your Reamweaver site, Reamweaver gets the
page from the target domain, changes the words as you specify, and stores
the result (along with images, etc.) in the fake website
Features:
When the target domain does not respond within a few seconds, use cached version
instead, if it exists
Automatically an error page is used for missing files
Query results are saved in separate cache files, speeding up database-driven
websites
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Reamweaver: Screenshot
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Mirrored Fake Website
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Faking Websites using Man-in-the-
Middle Phishing Kit
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Faking Websites using Man-in-the-
Middle Phishing Kit (cont
(contd)
d)
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Benefits to Fraudster
This kit can launch attacks, which can intercept any type of
credentials submitted to the site after the victim has logged
into the account
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Steps to Perform Footprinting
Mason now has enough information to bring down the network of Xmachi
Inc
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Summary
Whois and ARIN can reveal public information of a domain that can be
l
leveraged
d ffurther
th
Traceroute and mail tracking can be used to the target specific IP for IP
spoofing
fi
Nslookup can reveal specific users and zone transfers which can
compromise DNSs
DNS s security
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited