SlideShare a Scribd company logo
1 of 40
Hands-On Ethical Hacking
  and Network Defense
       Second Edition

             Chapter 4
Footprinting and Social Engineering
Objectives
• After reading this chapter and completing the
  exercises, you will be able to:
     –   Use Web tools for footprinting
     –   Conduct competitive intelligence
     –   Describe DNS zone transfers
     –   Identify the types of social engineering




Hands-On Ethical Hacking and Network Defense, Second Edition   2
Using Web Tools for Footprinting
• “Case the joint”
     – Look over the location
     – Find weakness in security systems
     – Types of locks and alarms used
• Footprinting
     – Finding information on company’s network
     – Passive and nonintrusive
     – Several available Web tools



Hands-On Ethical Hacking and Network Defense, Second Edition   3
Table 4-1 Summary of Web tools




Hands-On Ethical Hacking and Network Defense, Second Edition   4
Table 4-1 Summary of Web tools (cont’d.)

Hands-On Ethical Hacking and Network Defense, Second Edition     5
Conducting Competitive Intelligence
• Numerous resources to find information legally
     – Competitive intelligence
          • Gathering information using technology
• Security professionals must:
     – Explain methods used to gather information
          • Have a good understanding of methods




Hands-On Ethical Hacking and Network Defense, Second Edition   6
Analyzing a Company’s Web Site
• Easy source of critical information
     – Many available tools
• Paros
     – Powerful tool for UNIX and Windows OSs
     – Requires Java J2SE




Hands-On Ethical Hacking and Network Defense, Second Edition   7
Figure 4-1 The main window of Paros


Hands-On Ethical Hacking and Network Defense, Second Edition   8
Analyzing a Company’s Web Site
                  (cont’d.)
• Paros: searching for a Web site
    – Click Tools, Spider
    – Enter Web site’s URL
    – Check results




Hands-On Ethical Hacking and Network Defense, Second Edition   9
Figure 4-2 Entering a URL in the Input dialog box




Hands-On Ethical Hacking and Network Defense, Second Edition       10
Figure 4-3 Displaying filenames of all Web pages on a site

Hands-On Ethical Hacking and Network Defense, Second Edition              11
Analyzing a Company’s Web Site
                  (cont’d.)
• Paros: getting Web site structure
     – Click Tree, Scan All
     – Report includes:
          • Vulnerabilities
          • Risk levels
• Gathering information this way:
     – Time consuming




Hands-On Ethical Hacking and Network Defense, Second Edition   12
Figure 4-4 The Paros scanning report

Hands-On Ethical Hacking and Network Defense, Second Edition   13
Using Other Footprinting Tools
• Whois
     – Commonly used
     – Gathers IP address
       and domain
       information
     – Attackers can also
       use it


                                         Figure 4-5 Viewing information with the
                                         SamSpade Whois utility


Hands-On Ethical Hacking and Network Defense, Second Edition                       14
Using E-mail Addresses
• E-mail addresses
     – Help retrieve even more information
• Find e-mail address format
     – Guess other employees’ e-mail accounts
• Tool to find corporate employee information
     – Groups.google.com




Hands-On Ethical Hacking and Network Defense, Second Edition   15
Using HTTP Basics
• HTTP operates on port 80
• HTTP commands
     – Pull information from a Web server
• Basic understanding of HTTP
     – Beneficial for security testers
• Return codes
     – Reveal information about OS used
• HTTP methods
     – GET/          HTTP/1.1.

Hands-On Ethical Hacking and Network Defense, Second Edition   16
Table 4-2 HTTP client errors




Hands-On Ethical Hacking and Network Defense, Second Edition   17
Table 4-3 HTTP server errors




Hands-On Ethical Hacking and Network Defense, Second Edition   18
Table 4-4 HTTP methods




Hands-On Ethical Hacking and Network Defense, Second Edition   19
Figure 4-6 Using the OPTIONS HTTP method




Hands-On Ethical Hacking and Network Defense, Second Edition   20
Figure 4-7 Using the HEAD HTTP method




Hands-On Ethical Hacking and Network Defense, Second Edition   21
Other Methods of Gathering
                   Information
• With just a URL, you can determine:
     – Web server
     – OS
     – Names of IT personnel
• Other methods:
     – Cookies
     – Web bugs




Hands-On Ethical Hacking and Network Defense, Second Edition   22
Detecting Cookies and Web Bugs
• Cookie
     – Text file generated by a Web server
     – Stored on a user’s browser
     – Information sent back to Web server when user
       returns
     – Used to customize Web pages
     – Some cookies store personal information
          • Security issue




Hands-On Ethical Hacking and Network Defense, Second Edition   23
Detecting Cookies and Web Bugs
                  (cont’d.)
• Web bug
     –   One-pixel by one-pixel image file
     –   Referenced in an <IMG> tag
     –   Usually works with a cookie
     –   Purpose similar to spyware and adware
     –   Comes from third-party companies
          • Specializing in data collection




Hands-On Ethical Hacking and Network Defense, Second Edition   24
Using Domain Name Service Zone
              Transfers
• Domain Name System (DNS)
     – Resolves host names to IP addresses
     – People prefer URLs to IP addresses
          • Extremely vulnerable
• Zone transfer tools
     – Dig and Host
• Determining primary DNS server
     – Start of Authority (SOA) record
          • Shows zones or IP addresses
     – Zone transfer gives network diagram
Hands-On Ethical Hacking and Network Defense, Second Edition   25
Figure 4-9 Using the Dig command

Hands-On Ethical Hacking and Network Defense, Second Edition   26
Introduction to Social Engineering
• Older than computers
     – Targets human component of a network
• Goals
     – Obtain confidential information (passwords)
     – Obtain other personal information
• Tactics
     –   Persuasion
     –   Intimidation
     –   Coercion
     –   Extortion/blackmailing
Hands-On Ethical Hacking and Network Defense, Second Edition   27
Introduction to Social Engineering
                    (cont’d.)
• Biggest security threat
     – Most difficult to protect against
• Main idea:
     – “Why try to crack a password when you can simply
       ask for it?”
          • Users divulge passwords to IT personnel
• Human behavior studied
     – Personality traits
     – Body language


Hands-On Ethical Hacking and Network Defense, Second Edition   28
Introduction to Social Engineering
                    (cont’d.)
• Techniques
     –   Urgency
     –   Quid pro quo
     –   Status quo
     –   Kindness
     –   Position
• Train users
     – Not to reveal information
     – To verify caller identity
          • Ask questions and call back to confirm
Hands-On Ethical Hacking and Network Defense, Second Edition   29
Figure 4-10 The
   OSSTMM social-
   engineering template




Hands-On Ethical Hacking and Network Defense, Second Edition   30
The Art of Shoulder Surfing
• Shoulder surfer
     – Reads what users enter on keyboards
          • Logon names
          • Passwords
          • PINs
• Tools
     – Binoculars or high-powered telescopes
     – Key positions and typing techniques
     – Popular letter substitutions
          • $ equals s, @ equals a

Hands-On Ethical Hacking and Network Defense, Second Edition   31
The Art of Shoulder Surfing (cont’d.)
• Prevention
     – Avoid typing when:
          • Someone is nearby
          • Someone nearby is talking on cell phone
     – Computer monitors:
          • Face away from door or cubicle entryway
     – Immediately change password if you suspect
       someone is observing you




Hands-On Ethical Hacking and Network Defense, Second Edition   32
The Art of Dumpster Diving
• Attacker finds information in victim’s trash
     –   Discarded computer manuals
     –   Passwords jotted down
     –   Company phone directories
     –   Calendars with schedules
     –   Financial reports
     –   Interoffice memos
     –   Company policy
     –   Utility bills
     –   Resumes
Hands-On Ethical Hacking and Network Defense, Second Edition   33
The Art of Dumpster Diving (cont’d.)
• Prevention
     – Educate users
          • Dumpster diving
          • Proper trash disposal
     – Format disks before disposing them
          • Software writes binary zeros
          • Done at least seven times
     – Discard computer manuals offsite
     – Shred documents before disposal


Hands-On Ethical Hacking and Network Defense, Second Edition   34
The Art of Piggybacking
• Trailing closely behind an employee cleared to
  enter restricted areas
• How it works:
     –   Watch authorized personnel enter an area
     –   Quickly join them at security entrance
     –   Exploit desire to be polite and helpful
     –   Attacker wears a fake badge or security card




Hands-On Ethical Hacking and Network Defense, Second Edition   35
The Art of Piggybacking (cont’d.)
• Prevention
     – Use turnstiles
     – Train personnel to notify security about strangers
     – Do not hold secured doors for anyone
          • Even people they know
     – All employees must use access cards




Hands-On Ethical Hacking and Network Defense, Second Edition   36
Phishing
• Phishing e-mails
     – “Update your account details”
     – Usually framed as urgent request to visit a Web site
          • Web site is a fake
• Spear phishing
     – Combines social engineering and exploiting
       vulnerabilities
     – E-mail attacks directed at specific people
          • Comes from someone the recipient knows
          • Mentions topics of mutual interest

Hands-On Ethical Hacking and Network Defense, Second Edition   37
Figure 4-12 A phishing e-mail

Hands-On Ethical Hacking and Network Defense, Second Edition   38
Summary
• Footprinting
     – Gathering network information with Web tools
• Competitive intelligence
     – Gathered through observation and Web tools
• IP addresses and domain names
     – Found by using tools (e.g., SamSpade)
• Cookies and Web bugs
     – Collect and retrieve user’s information
• Zone transfers
     – Used to obtain network topologies
Hands-On Ethical Hacking and Network Defense, Second Edition   39
Summary (cont’d.)
• Social engineering
     – Attacks using human nature
          • Many methods
     – Educate personnel
• Attacker techniques
     –   Shoulder surfing
     –   Dumpster diving
     –   Piggybacking
     –   Phishing


Hands-On Ethical Hacking and Network Defense, Second Edition   40

More Related Content

What's hot

Understanding computer attacks and attackers - Eric Vanderburg - JURINNOV
Understanding computer attacks and attackers - Eric Vanderburg - JURINNOVUnderstanding computer attacks and attackers - Eric Vanderburg - JURINNOV
Understanding computer attacks and attackers - Eric Vanderburg - JURINNOVEric Vanderburg
 
BAIT1103 Chapter 1
BAIT1103 Chapter 1BAIT1103 Chapter 1
BAIT1103 Chapter 1limsh
 
Cyber Crimes & Cyber Forensics
Cyber Crimes & Cyber ForensicsCyber Crimes & Cyber Forensics
Cyber Crimes & Cyber Forensicsjahanzebmunawar
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hackDharmesh Makwana
 
Secure Computer Forensics and its tools
Secure Computer Forensics and its toolsSecure Computer Forensics and its tools
Secure Computer Forensics and its toolsKathirvel Ayyaswamy
 
Cehv6 module 01 introduction to ethical hacking
Cehv6 module 01 introduction to ethical hackingCehv6 module 01 introduction to ethical hacking
Cehv6 module 01 introduction to ethical hackinganonymousrider
 

What's hot (19)

Understanding computer attacks and attackers - Eric Vanderburg - JURINNOV
Understanding computer attacks and attackers - Eric Vanderburg - JURINNOVUnderstanding computer attacks and attackers - Eric Vanderburg - JURINNOV
Understanding computer attacks and attackers - Eric Vanderburg - JURINNOV
 
Chap 1 general introduction to computer forensics
Chap 1  general introduction to computer forensicsChap 1  general introduction to computer forensics
Chap 1 general introduction to computer forensics
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
BAIT1103 Chapter 1
BAIT1103 Chapter 1BAIT1103 Chapter 1
BAIT1103 Chapter 1
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cyber Crimes & Cyber Forensics
Cyber Crimes & Cyber ForensicsCyber Crimes & Cyber Forensics
Cyber Crimes & Cyber Forensics
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
cyber Forensics
cyber Forensicscyber Forensics
cyber Forensics
 
Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Hackers
HackersHackers
Hackers
 
Secure Computer Forensics and its tools
Secure Computer Forensics and its toolsSecure Computer Forensics and its tools
Secure Computer Forensics and its tools
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Cehv6 module 01 introduction to ethical hacking
Cehv6 module 01 introduction to ethical hackingCehv6 module 01 introduction to ethical hacking
Cehv6 module 01 introduction to ethical hacking
 
Cyber Forensics Module 2
Cyber Forensics Module 2Cyber Forensics Module 2
Cyber Forensics Module 2
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 

Viewers also liked

كيف تحمي نفسك من البرمجيات الخبيثة
كيف تحمي نفسك من البرمجيات الخبيثةكيف تحمي نفسك من البرمجيات الخبيثة
كيف تحمي نفسك من البرمجيات الخبيثةSoftex Software House
 
RPKI (Resource Public Key Infrastructure)
RPKI (Resource Public Key Infrastructure)RPKI (Resource Public Key Infrastructure)
RPKI (Resource Public Key Infrastructure)Fakrul Alam
 
OTechs IT Package Training Course
OTechs IT Package Training CourseOTechs IT Package Training Course
OTechs IT Package Training CourseOsman Suliman
 
ملخص ورشة الإبتزاز والإحتيال الإلكتروني
ملخص ورشة الإبتزاز والإحتيال الإلكترونيملخص ورشة الإبتزاز والإحتيال الإلكتروني
ملخص ورشة الإبتزاز والإحتيال الإلكترونيHassan Al Ajmi
 
ملخص ورشة أساسيات أمن المعلومات
ملخص ورشة أساسيات أمن المعلوماتملخص ورشة أساسيات أمن المعلومات
ملخص ورشة أساسيات أمن المعلوماتHassan Al Ajmi
 
CNIT 123: Ch 4: Footprinting and Social Engineering
CNIT 123: Ch 4: Footprinting and Social EngineeringCNIT 123: Ch 4: Footprinting and Social Engineering
CNIT 123: Ch 4: Footprinting and Social EngineeringSam Bowne
 
CNIT 123: Ch 1 Ethical Hacking Overview
CNIT 123: Ch 1 Ethical Hacking OverviewCNIT 123: Ch 1 Ethical Hacking Overview
CNIT 123: Ch 1 Ethical Hacking OverviewSam Bowne
 
أنظمة الحماية من الفايروسات و الهاكرز
أنظمة الحماية من الفايروسات و الهاكرزأنظمة الحماية من الفايروسات و الهاكرز
أنظمة الحماية من الفايروسات و الهاكرزsultan_Alqarni
 
امن الوثائق والمعلومات عرض تقديمى
امن الوثائق والمعلومات عرض تقديمىامن الوثائق والمعلومات عرض تقديمى
امن الوثائق والمعلومات عرض تقديمىNasser Shafik
 
امن المعلومات
امن المعلوماتامن المعلومات
امن المعلوماتToto Tarik
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructurevimal kumar
 

Viewers also liked (14)

رشيد222
رشيد222رشيد222
رشيد222
 
كيف تحمي نفسك من البرمجيات الخبيثة
كيف تحمي نفسك من البرمجيات الخبيثةكيف تحمي نفسك من البرمجيات الخبيثة
كيف تحمي نفسك من البرمجيات الخبيثة
 
cv emad 2015
cv emad 2015cv emad 2015
cv emad 2015
 
RPKI (Resource Public Key Infrastructure)
RPKI (Resource Public Key Infrastructure)RPKI (Resource Public Key Infrastructure)
RPKI (Resource Public Key Infrastructure)
 
OTechs IT Package Training Course
OTechs IT Package Training CourseOTechs IT Package Training Course
OTechs IT Package Training Course
 
ملخص ورشة الإبتزاز والإحتيال الإلكتروني
ملخص ورشة الإبتزاز والإحتيال الإلكترونيملخص ورشة الإبتزاز والإحتيال الإلكتروني
ملخص ورشة الإبتزاز والإحتيال الإلكتروني
 
ملخص ورشة أساسيات أمن المعلومات
ملخص ورشة أساسيات أمن المعلوماتملخص ورشة أساسيات أمن المعلومات
ملخص ورشة أساسيات أمن المعلومات
 
CNIT 123: Ch 4: Footprinting and Social Engineering
CNIT 123: Ch 4: Footprinting and Social EngineeringCNIT 123: Ch 4: Footprinting and Social Engineering
CNIT 123: Ch 4: Footprinting and Social Engineering
 
CNIT 123: Ch 1 Ethical Hacking Overview
CNIT 123: Ch 1 Ethical Hacking OverviewCNIT 123: Ch 1 Ethical Hacking Overview
CNIT 123: Ch 1 Ethical Hacking Overview
 
أنظمة الحماية من الفايروسات و الهاكرز
أنظمة الحماية من الفايروسات و الهاكرزأنظمة الحماية من الفايروسات و الهاكرز
أنظمة الحماية من الفايروسات و الهاكرز
 
امن الوثائق والمعلومات عرض تقديمى
امن الوثائق والمعلومات عرض تقديمىامن الوثائق والمعلومات عرض تقديمى
امن الوثائق والمعلومات عرض تقديمى
 
امن المعلومات
امن المعلوماتامن المعلومات
امن المعلومات
 
Pki for dummies
Pki for dummiesPki for dummies
Pki for dummies
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructure
 

Similar to internet

Meletis Belsis - Introduction to information security
Meletis Belsis - Introduction to information securityMeletis Belsis - Introduction to information security
Meletis Belsis - Introduction to information securityMeletis Belsis MPhil/MRes/BSc
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical HackingRohan Raj
 
How to write secure code
How to write secure codeHow to write secure code
How to write secure codeFlaskdata.io
 
Chapter 2 for cyber security examination.pptx
Chapter 2 for cyber security examination.pptxChapter 2 for cyber security examination.pptx
Chapter 2 for cyber security examination.pptxMahdiHasanSowrav
 
324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.pptssuserde23af
 
324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.pptssuserde23af
 
324515851-Ethical-Hacking-Ppt-Download4575A.ppt
324515851-Ethical-Hacking-Ppt-Download4575A.ppt324515851-Ethical-Hacking-Ppt-Download4575A.ppt
324515851-Ethical-Hacking-Ppt-Download4575A.pptssuserde23af
 
Ethical Hacking: Safeguarding Systems through Responsible Security Testing
Ethical Hacking: Safeguarding Systems through Responsible Security TestingEthical Hacking: Safeguarding Systems through Responsible Security Testing
Ethical Hacking: Safeguarding Systems through Responsible Security Testingchampubhaiya8
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationJoshua Prince
 
Cambodia CERT Seminar: Incident response for ransomeware attacks
Cambodia CERT Seminar: Incident response for ransomeware attacksCambodia CERT Seminar: Incident response for ransomeware attacks
Cambodia CERT Seminar: Incident response for ransomeware attacksAPNIC
 
Web hacking 1.0
Web hacking 1.0Web hacking 1.0
Web hacking 1.0Q Fadlan
 
technical-information-gathering-slides.pdf
technical-information-gathering-slides.pdftechnical-information-gathering-slides.pdf
technical-information-gathering-slides.pdfMarceloCunha571649
 
E-COMMERCE SECURITY (2).ppt
E-COMMERCE SECURITY (2).pptE-COMMERCE SECURITY (2).ppt
E-COMMERCE SECURITY (2).pptHemlata Gangwar
 
building foundation for ethical hacking.ppt
building foundation for ethical hacking.pptbuilding foundation for ethical hacking.ppt
building foundation for ethical hacking.pptShivaniSingha1
 

Similar to internet (20)

Meletis Belsis - Introduction to information security
Meletis Belsis - Introduction to information securityMeletis Belsis - Introduction to information security
Meletis Belsis - Introduction to information security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking by shivam
Ethical hacking by shivamEthical hacking by shivam
Ethical hacking by shivam
 
How to write secure code
How to write secure codeHow to write secure code
How to write secure code
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Chapter 2 for cyber security examination.pptx
Chapter 2 for cyber security examination.pptxChapter 2 for cyber security examination.pptx
Chapter 2 for cyber security examination.pptx
 
324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt
 
324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt324515851-Ethical-Hacking-Ppt-Download4575.ppt
324515851-Ethical-Hacking-Ppt-Download4575.ppt
 
324515851-Ethical-Hacking-Ppt-Download4575A.ppt
324515851-Ethical-Hacking-Ppt-Download4575A.ppt324515851-Ethical-Hacking-Ppt-Download4575A.ppt
324515851-Ethical-Hacking-Ppt-Download4575A.ppt
 
Ethical Hacking: Safeguarding Systems through Responsible Security Testing
Ethical Hacking: Safeguarding Systems through Responsible Security TestingEthical Hacking: Safeguarding Systems through Responsible Security Testing
Ethical Hacking: Safeguarding Systems through Responsible Security Testing
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cambodia CERT Seminar: Incident response for ransomeware attacks
Cambodia CERT Seminar: Incident response for ransomeware attacksCambodia CERT Seminar: Incident response for ransomeware attacks
Cambodia CERT Seminar: Incident response for ransomeware attacks
 
Web hacking 1.0
Web hacking 1.0Web hacking 1.0
Web hacking 1.0
 
Digital Self Defense (RRLC version)
Digital Self Defense (RRLC version)Digital Self Defense (RRLC version)
Digital Self Defense (RRLC version)
 
technical-information-gathering-slides.pdf
technical-information-gathering-slides.pdftechnical-information-gathering-slides.pdf
technical-information-gathering-slides.pdf
 
E-COMMERCE SECURITY (2).ppt
E-COMMERCE SECURITY (2).pptE-COMMERCE SECURITY (2).ppt
E-COMMERCE SECURITY (2).ppt
 
building foundation for ethical hacking.ppt
building foundation for ethical hacking.pptbuilding foundation for ethical hacking.ppt
building foundation for ethical hacking.ppt
 
Path of Cyber Security
Path of Cyber SecurityPath of Cyber Security
Path of Cyber Security
 
Path of Cyber Security
Path of Cyber SecurityPath of Cyber Security
Path of Cyber Security
 

internet

  • 1. Hands-On Ethical Hacking and Network Defense Second Edition Chapter 4 Footprinting and Social Engineering
  • 2. Objectives • After reading this chapter and completing the exercises, you will be able to: – Use Web tools for footprinting – Conduct competitive intelligence – Describe DNS zone transfers – Identify the types of social engineering Hands-On Ethical Hacking and Network Defense, Second Edition 2
  • 3. Using Web Tools for Footprinting • “Case the joint” – Look over the location – Find weakness in security systems – Types of locks and alarms used • Footprinting – Finding information on company’s network – Passive and nonintrusive – Several available Web tools Hands-On Ethical Hacking and Network Defense, Second Edition 3
  • 4. Table 4-1 Summary of Web tools Hands-On Ethical Hacking and Network Defense, Second Edition 4
  • 5. Table 4-1 Summary of Web tools (cont’d.) Hands-On Ethical Hacking and Network Defense, Second Edition 5
  • 6. Conducting Competitive Intelligence • Numerous resources to find information legally – Competitive intelligence • Gathering information using technology • Security professionals must: – Explain methods used to gather information • Have a good understanding of methods Hands-On Ethical Hacking and Network Defense, Second Edition 6
  • 7. Analyzing a Company’s Web Site • Easy source of critical information – Many available tools • Paros – Powerful tool for UNIX and Windows OSs – Requires Java J2SE Hands-On Ethical Hacking and Network Defense, Second Edition 7
  • 8. Figure 4-1 The main window of Paros Hands-On Ethical Hacking and Network Defense, Second Edition 8
  • 9. Analyzing a Company’s Web Site (cont’d.) • Paros: searching for a Web site – Click Tools, Spider – Enter Web site’s URL – Check results Hands-On Ethical Hacking and Network Defense, Second Edition 9
  • 10. Figure 4-2 Entering a URL in the Input dialog box Hands-On Ethical Hacking and Network Defense, Second Edition 10
  • 11. Figure 4-3 Displaying filenames of all Web pages on a site Hands-On Ethical Hacking and Network Defense, Second Edition 11
  • 12. Analyzing a Company’s Web Site (cont’d.) • Paros: getting Web site structure – Click Tree, Scan All – Report includes: • Vulnerabilities • Risk levels • Gathering information this way: – Time consuming Hands-On Ethical Hacking and Network Defense, Second Edition 12
  • 13. Figure 4-4 The Paros scanning report Hands-On Ethical Hacking and Network Defense, Second Edition 13
  • 14. Using Other Footprinting Tools • Whois – Commonly used – Gathers IP address and domain information – Attackers can also use it Figure 4-5 Viewing information with the SamSpade Whois utility Hands-On Ethical Hacking and Network Defense, Second Edition 14
  • 15. Using E-mail Addresses • E-mail addresses – Help retrieve even more information • Find e-mail address format – Guess other employees’ e-mail accounts • Tool to find corporate employee information – Groups.google.com Hands-On Ethical Hacking and Network Defense, Second Edition 15
  • 16. Using HTTP Basics • HTTP operates on port 80 • HTTP commands – Pull information from a Web server • Basic understanding of HTTP – Beneficial for security testers • Return codes – Reveal information about OS used • HTTP methods – GET/ HTTP/1.1. Hands-On Ethical Hacking and Network Defense, Second Edition 16
  • 17. Table 4-2 HTTP client errors Hands-On Ethical Hacking and Network Defense, Second Edition 17
  • 18. Table 4-3 HTTP server errors Hands-On Ethical Hacking and Network Defense, Second Edition 18
  • 19. Table 4-4 HTTP methods Hands-On Ethical Hacking and Network Defense, Second Edition 19
  • 20. Figure 4-6 Using the OPTIONS HTTP method Hands-On Ethical Hacking and Network Defense, Second Edition 20
  • 21. Figure 4-7 Using the HEAD HTTP method Hands-On Ethical Hacking and Network Defense, Second Edition 21
  • 22. Other Methods of Gathering Information • With just a URL, you can determine: – Web server – OS – Names of IT personnel • Other methods: – Cookies – Web bugs Hands-On Ethical Hacking and Network Defense, Second Edition 22
  • 23. Detecting Cookies and Web Bugs • Cookie – Text file generated by a Web server – Stored on a user’s browser – Information sent back to Web server when user returns – Used to customize Web pages – Some cookies store personal information • Security issue Hands-On Ethical Hacking and Network Defense, Second Edition 23
  • 24. Detecting Cookies and Web Bugs (cont’d.) • Web bug – One-pixel by one-pixel image file – Referenced in an <IMG> tag – Usually works with a cookie – Purpose similar to spyware and adware – Comes from third-party companies • Specializing in data collection Hands-On Ethical Hacking and Network Defense, Second Edition 24
  • 25. Using Domain Name Service Zone Transfers • Domain Name System (DNS) – Resolves host names to IP addresses – People prefer URLs to IP addresses • Extremely vulnerable • Zone transfer tools – Dig and Host • Determining primary DNS server – Start of Authority (SOA) record • Shows zones or IP addresses – Zone transfer gives network diagram Hands-On Ethical Hacking and Network Defense, Second Edition 25
  • 26. Figure 4-9 Using the Dig command Hands-On Ethical Hacking and Network Defense, Second Edition 26
  • 27. Introduction to Social Engineering • Older than computers – Targets human component of a network • Goals – Obtain confidential information (passwords) – Obtain other personal information • Tactics – Persuasion – Intimidation – Coercion – Extortion/blackmailing Hands-On Ethical Hacking and Network Defense, Second Edition 27
  • 28. Introduction to Social Engineering (cont’d.) • Biggest security threat – Most difficult to protect against • Main idea: – “Why try to crack a password when you can simply ask for it?” • Users divulge passwords to IT personnel • Human behavior studied – Personality traits – Body language Hands-On Ethical Hacking and Network Defense, Second Edition 28
  • 29. Introduction to Social Engineering (cont’d.) • Techniques – Urgency – Quid pro quo – Status quo – Kindness – Position • Train users – Not to reveal information – To verify caller identity • Ask questions and call back to confirm Hands-On Ethical Hacking and Network Defense, Second Edition 29
  • 30. Figure 4-10 The OSSTMM social- engineering template Hands-On Ethical Hacking and Network Defense, Second Edition 30
  • 31. The Art of Shoulder Surfing • Shoulder surfer – Reads what users enter on keyboards • Logon names • Passwords • PINs • Tools – Binoculars or high-powered telescopes – Key positions and typing techniques – Popular letter substitutions • $ equals s, @ equals a Hands-On Ethical Hacking and Network Defense, Second Edition 31
  • 32. The Art of Shoulder Surfing (cont’d.) • Prevention – Avoid typing when: • Someone is nearby • Someone nearby is talking on cell phone – Computer monitors: • Face away from door or cubicle entryway – Immediately change password if you suspect someone is observing you Hands-On Ethical Hacking and Network Defense, Second Edition 32
  • 33. The Art of Dumpster Diving • Attacker finds information in victim’s trash – Discarded computer manuals – Passwords jotted down – Company phone directories – Calendars with schedules – Financial reports – Interoffice memos – Company policy – Utility bills – Resumes Hands-On Ethical Hacking and Network Defense, Second Edition 33
  • 34. The Art of Dumpster Diving (cont’d.) • Prevention – Educate users • Dumpster diving • Proper trash disposal – Format disks before disposing them • Software writes binary zeros • Done at least seven times – Discard computer manuals offsite – Shred documents before disposal Hands-On Ethical Hacking and Network Defense, Second Edition 34
  • 35. The Art of Piggybacking • Trailing closely behind an employee cleared to enter restricted areas • How it works: – Watch authorized personnel enter an area – Quickly join them at security entrance – Exploit desire to be polite and helpful – Attacker wears a fake badge or security card Hands-On Ethical Hacking and Network Defense, Second Edition 35
  • 36. The Art of Piggybacking (cont’d.) • Prevention – Use turnstiles – Train personnel to notify security about strangers – Do not hold secured doors for anyone • Even people they know – All employees must use access cards Hands-On Ethical Hacking and Network Defense, Second Edition 36
  • 37. Phishing • Phishing e-mails – “Update your account details” – Usually framed as urgent request to visit a Web site • Web site is a fake • Spear phishing – Combines social engineering and exploiting vulnerabilities – E-mail attacks directed at specific people • Comes from someone the recipient knows • Mentions topics of mutual interest Hands-On Ethical Hacking and Network Defense, Second Edition 37
  • 38. Figure 4-12 A phishing e-mail Hands-On Ethical Hacking and Network Defense, Second Edition 38
  • 39. Summary • Footprinting – Gathering network information with Web tools • Competitive intelligence – Gathered through observation and Web tools • IP addresses and domain names – Found by using tools (e.g., SamSpade) • Cookies and Web bugs – Collect and retrieve user’s information • Zone transfers – Used to obtain network topologies Hands-On Ethical Hacking and Network Defense, Second Edition 39
  • 40. Summary (cont’d.) • Social engineering – Attacks using human nature • Many methods – Educate personnel • Attacker techniques – Shoulder surfing – Dumpster diving – Piggybacking – Phishing Hands-On Ethical Hacking and Network Defense, Second Edition 40