SlideShare uma empresa Scribd logo
1 de 64
Baixar para ler offline
Hands-On Ethical Hacking
and Network Defense
Chapter 4
Footprinting and Social Engineering
Updated 9-27-17
Objectives
■ Use Web tools for footprinting
■ Conduct competitive intelligence
■ Describe DNS zone transfers
■ Identify the types of social
engineering
Using Web Tools for Footprinting
■ “Case the joint”
• Look over the location
• Find weakness in security systems
• Types of locks, alarms
■ In computer jargon, this is called
footprinting
• Discover information about
■ The organization
■ Its network
Table 4-1 Summary of Web tools
Table 4-1 Summary of Web tools (cont’d.)
Conducting Competitive Intelligence
■ Numerous resources to find
information legally
■ Competitive Intelligence
• Gathering information using technology
■ Identify methods others can use to find
information about your organization
■ Limit amount of information company
makes public
Analyzing a Company’s Web Site
■ Web pages are an easy source of
information
■ Many tools available
■ BurpSuite
• Powerful proxy for all platforms (uses
Java)
• https://portswigger.net/burp/
Burp Configuration
■ "Proxy" tab, "Intercept" sub-tab
• Adjust to "Intercept is off"
■ "Proxy" tab, "Options" sub-tab
• Start running on port 8080
Proxy Settings in Firefox
■ At top right, click "3
bars" icon, then the
Gear icon
■ In "Advanced", on the
"Network" tab, click
"Settings”
Surf an Insecure Site like ietf.org
■ "HTTP History" tab shows each
request and response
Surf a Secure Site like samsclass.info
■ Browser detects Burp's MITM attack
and warns you
Demo: Stitcher
Installing the Burp Certificate
▪ On computer, in Firefox, using the
proxy, visit http://burp
▪ Click the "CA Certificate" link
▪ Change file extension to .cer
▪ Drag file onto Genymotion phone
▪ On phone, settings, Security, "Install
from SD card"
Demo: Posting a Long Tweet
Other Proxy Functions
▪ Intercept & Modify Requests
▪ Can exploit poorly-made shopping sites
▪ Spider
▪ Finds all the pages in a site
▪ Saves a local copy of them
▪ Scan for vulnerabilities
▪ Get authorization first
Other Proxies
■ Zed Attack Proxy from OWASP
• Can scan for vulnerabilities
■ Tamper Data
• Firefox plug-in for easy interception and
alteration of requests
■ Chrome Developer Tools
• Click 3-bars, "More Tools", "Developer
Tools"
• Allows you to examine requests and
responses
Timeline
■ Shows requests & responses even for
secure sites
Using Other Footprinting Tools
■ Whois
• Commonly used tool
• Gathers IP address and domain
information
• Attackers can also use it
■ Host command
• Can look up one IP address, or the whole
DNS Zone file
■ All the servers in the domain
ARIN Whois
from Linux
■ host mit.edu
■ nc whois.arin.net
■ 18.7.22.69
■ This shows
registration
information for the
domain
Sam Spade
■ GUI tool
■ Available
for UNIX
and
Windows
■ Easy to use
Maltego
Using E-mail Addresses
■ E-mail addresses help you retrieve
even more information than the
previous commands
■ Find e-mail address format
• Guess other employees’ e-mail accounts
■ Tool to find corporate employee
information
• Groups.google.com
Using HTTP Basics
■ HTTP operates on port 80
■ Use HTTP language to pull
information from a Web server
■ Basic understanding of HTTP is
beneficial for security testers
■ Return codes
• Reveal information about server OS
Using HTTP Basics (continued)
■ HTTP methods
• GET / HTTP/1.1. is the most basic
method
• Can determine information about server
OS from the server’s generated output
Using the OPTIONS Method
Using the GET Method
Other Methods of Gathering
Information
■ Cookies
■ Web bugs
Detecting Cookies and Web Bugs
■ Cookie
• Text file generated by a Web server
• Stored on a user’s browser
• Information sent back to Web server
when user returns
• Used to customize Web pages
• Some cookies store personal information
■ Security issue
Viewing Cookies
■ In Firefox
■ Tools, Options
■ Privacy tab
■ Show Cookies
Detecting Cookies and Web Bugs
(continued)
■ Web bug
• 1-pixel x 1-pixel image file (usually
transparent)
• Referenced in an <IMG> tag
• Usually works with a cookie
• Purpose similar to that of spyware and
adware
• Comes from third-party companies
specializing in data collection
Ghostery
■ Firefox & Chrome extension to reveal Web bugs
Using Domain Name Service (DNS)
Zone Transfers
■ DNS
• Resolves host names to IP addresses
• People prefer using URLs to IP addresses
■ Zone Transfer tools
• Dig
• Host
Primary DNS Server
■ Determining company’s primary DNS
server
• Look for the Start of Authority (SOA)
record
• Shows zones or IP addresses
Using dig to find the SOA
■ dig soa mit.edu
■ Shows three
servers, with IP
addresses
■ This is a start at
mapping the MIT
network
Using (DNS) Zone Transfers
■ Zone Transfer
• Enables you to see all hosts on a
network
• Gives you organization’s network
diagram
■ MIT has protected their network – zone
transfers no longer work
■ dig @BITSY.mit.edu mit.edu axfr
■ Command fails now
Blocking Zone Transfers
• See link Ch 4e
Introduction to Social Engineering
■ Older than computers
■ Targets the human component of a
network
■ Goals
• Obtain confidential information
(passwords)
• Obtain personal information
■ Link Ch 4l
■ Link Ch 4m
HB Gary Federal Hacked
■ Link Ch 4n
Tactics
• Persuasion
• Intimidation
• Coercion
• Extortion/blackmailing
Introduction to Social Engineering
(continued)
■ The biggest security threat to networks
■ Most difficult to protect against
■ Main idea:
• “Why to crack a password when you can
simply ask for it?”
• Users divulge their passwords to IT
personnel
Social Engineer Studies Human
Behavior
• Recognize personality traits
• Understand how to read body language
Introduction to Social Engineering
(continued)
■ Techniques
• Urgency
• Quid pro quo
• Status quo
• Kindness
• Position
Preventing Social Engineering
■ Train user not to reveal any
information to outsiders
■ Verify caller identity
• Ask questions
• Call back to confirm
■ Security drills
DEF CON Social Engineering Contest
■ Link Ch 4k
The Art of Shoulder Surfing
■ Shoulder surfer
• Reads what users enter on keyboards
■ Logon names
■ Passwords
■ PINs
Tools for Shoulder Surfing
■ Binoculars or telescopes or cameras
in cell phones
■ Knowledge of key positions and
typing techniques
■ Knowledge of popular letter
substitutions
• s equals $, a equals @
The Art of Shoulder Surfing
(continued)
■ Prevention
• Avoid typing when someone is nearby
• Avoid typing when someone nearby is
talking on cell phone
• Computer monitors should face away
from door or cubicle entryway
• Immediately change password if you
suspect someone is observing you
Dumpster Diving
■ Attacker finds information in victim’s
trash
• Discarded computer manuals
■ Notes or passwords written in them
• Telephone directories
• Calendars with schedules
• Financial reports
• Interoffice memos
• Company policy
• Utility bills
• Resumes of employees
The Art of Dumpster Diving (continued)
■ Prevention
• Educate your users about dumpster
diving
• Proper trash disposal
• Use “disk shredder” software to erase
disks before discarding them
■ Software writes random bits
■ Done at least seven times
• Discard computer manuals offsite
• Shred documents before disposal
Piggybacking
■ Trailing closely behind an employee
cleared to enter restricted areas
■ How it works:
• Watch authorized personnel enter an area
• Quickly join them at security entrance
• Exploit the desire of other to be polite
and helpful
• Attacker wears a fake badge or security
card
Piggybacking Prevention
• Use turnstiles
• Train personnel to notify the presence of
strangers
• Do not hold secured doors for anyone
■ Even for people you know
• All employees must use secure cards
Phishing
■ Deceptive emails or text messages
■ Can take money, passwords, or install
malware on your computer
Ch 4: Footprinting and Social Engineering

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

CNIT 123: Ch 3: Network and Computer Attacks
CNIT 123: Ch 3: Network and Computer AttacksCNIT 123: Ch 3: Network and Computer Attacks
CNIT 123: Ch 3: Network and Computer Attacks
 
Footprinting and reconnaissance
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissance
 
Brute force-attack presentation
Brute force-attack presentationBrute force-attack presentation
Brute force-attack presentation
 
Ch 11: Hacking Wireless Networks
Ch 11: Hacking Wireless NetworksCh 11: Hacking Wireless Networks
Ch 11: Hacking Wireless Networks
 
Social engineering
Social engineering Social engineering
Social engineering
 
DNS Attacks
DNS AttacksDNS Attacks
DNS Attacks
 
CNIT 123 Ch 1: Ethical Hacking Overview
CNIT 123 Ch 1: Ethical Hacking OverviewCNIT 123 Ch 1: Ethical Hacking Overview
CNIT 123 Ch 1: Ethical Hacking Overview
 
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and PoliciesCISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
 
Password cracking and brute force
Password cracking and brute forcePassword cracking and brute force
Password cracking and brute force
 
Penetration Testing
Penetration Testing Penetration Testing
Penetration Testing
 
Footprinting
FootprintingFootprinting
Footprinting
 
cyber security and threats.pptx
cyber security and threats.pptxcyber security and threats.pptx
cyber security and threats.pptx
 
Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
 
Malware forensics
Malware forensicsMalware forensics
Malware forensics
 
Email Forensics
Email ForensicsEmail Forensics
Email Forensics
 
Bettercap
BettercapBettercap
Bettercap
 
Malicious Url Detection Using Machine Learning
Malicious Url Detection Using Machine LearningMalicious Url Detection Using Machine Learning
Malicious Url Detection Using Machine Learning
 
Introduction to foot printing
Introduction to foot printingIntroduction to foot printing
Introduction to foot printing
 
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
 
Reconnaissance - For pentesting and user awareness
Reconnaissance - For pentesting and user awarenessReconnaissance - For pentesting and user awareness
Reconnaissance - For pentesting and user awareness
 

Destaque

Destaque (20)

Ch 5: Port Scanning
Ch 5: Port ScanningCh 5: Port Scanning
Ch 5: Port Scanning
 
CNIT 127 Ch 2: Stack overflows on Linux
CNIT 127 Ch 2: Stack overflows on LinuxCNIT 127 Ch 2: Stack overflows on Linux
CNIT 127 Ch 2: Stack overflows on Linux
 
CNIT 128: 6: Mobile services and mobile Web (part 1: Beginning Through OAuth)
CNIT 128: 6: Mobile services and mobile Web (part 1: Beginning Through OAuth)CNIT 128: 6: Mobile services and mobile Web (part 1: Beginning Through OAuth)
CNIT 128: 6: Mobile services and mobile Web (part 1: Beginning Through OAuth)
 
CNIT 128 Ch 6: Mobile services and mobile Web (part 2: SAML to end)
CNIT 128 Ch 6: Mobile services and mobile Web (part 2: SAML to end)CNIT 128 Ch 6: Mobile services and mobile Web (part 2: SAML to end)
CNIT 128 Ch 6: Mobile services and mobile Web (part 2: SAML to end)
 
Ch 8: Desktop and Server OS Vulnerabilites
Ch 8: Desktop and Server OS VulnerabilitesCh 8: Desktop and Server OS Vulnerabilites
Ch 8: Desktop and Server OS Vulnerabilites
 
Ch 9: Embedded Operating Systems: The Hidden Threat
Ch 9: Embedded Operating Systems: The Hidden ThreatCh 9: Embedded Operating Systems: The Hidden Threat
Ch 9: Embedded Operating Systems: The Hidden Threat
 
Ch 3: Network and Computer Attacks
Ch 3: Network and Computer AttacksCh 3: Network and Computer Attacks
Ch 3: Network and Computer Attacks
 
Ch 12: Cryptography
Ch 12: CryptographyCh 12: Cryptography
Ch 12: Cryptography
 
Ch 10: Hacking Web Servers
Ch 10: Hacking Web ServersCh 10: Hacking Web Servers
Ch 10: Hacking Web Servers
 
CNIT 128 5: Mobile malware
CNIT 128 5: Mobile malwareCNIT 128 5: Mobile malware
CNIT 128 5: Mobile malware
 
CNIT 127 Lecture 7: Intro to 64-Bit Assembler (not in book)
CNIT 127 Lecture 7: Intro to 64-Bit Assembler (not in book)CNIT 127 Lecture 7: Intro to 64-Bit Assembler (not in book)
CNIT 127 Lecture 7: Intro to 64-Bit Assembler (not in book)
 
CNIT 127: Ch 8: Windows overflows (Part 2)
CNIT 127: Ch 8: Windows overflows (Part 2)CNIT 127: Ch 8: Windows overflows (Part 2)
CNIT 127: Ch 8: Windows overflows (Part 2)
 
CNIT 126 7: Analyzing Malicious Windows Programs
CNIT 126 7: Analyzing Malicious Windows ProgramsCNIT 126 7: Analyzing Malicious Windows Programs
CNIT 126 7: Analyzing Malicious Windows Programs
 
CNIT 127 14: Protection Mechanisms
CNIT 127 14: Protection MechanismsCNIT 127 14: Protection Mechanisms
CNIT 127 14: Protection Mechanisms
 
CNIT 126 6: Recognizing C Code Constructs in Assembly
CNIT 126 6: Recognizing C Code Constructs in Assembly CNIT 126 6: Recognizing C Code Constructs in Assembly
CNIT 126 6: Recognizing C Code Constructs in Assembly
 
CNIT 126 5: IDA Pro
CNIT 126 5: IDA Pro CNIT 126 5: IDA Pro
CNIT 126 5: IDA Pro
 
CISSP Prep: Ch 3. Asset Security
CISSP Prep: Ch 3. Asset SecurityCISSP Prep: Ch 3. Asset Security
CISSP Prep: Ch 3. Asset Security
 
CNIT 121: 9 Network Evidence
CNIT 121: 9 Network EvidenceCNIT 121: 9 Network Evidence
CNIT 121: 9 Network Evidence
 
CNIT 121: 14 Investigating Applications
CNIT 121: 14 Investigating ApplicationsCNIT 121: 14 Investigating Applications
CNIT 121: 14 Investigating Applications
 
CNIT 129S: 9: Attacking Data Stores (Part 2 of 2)
CNIT 129S: 9: Attacking Data Stores (Part 2 of 2)CNIT 129S: 9: Attacking Data Stores (Part 2 of 2)
CNIT 129S: 9: Attacking Data Stores (Part 2 of 2)
 

Semelhante a Ch 4: Footprinting and Social Engineering

Dafgjgghhghfhjgghjhgy06-Footprinting.pptx
Dafgjgghhghfhjgghjhgy06-Footprinting.pptxDafgjgghhghfhjgghjhgy06-Footprinting.pptx
Dafgjgghhghfhjgghjhgy06-Footprinting.pptx
AlfredObia1
 
Chapter 2 for cyber security examination.pptx
Chapter 2 for cyber security examination.pptxChapter 2 for cyber security examination.pptx
Chapter 2 for cyber security examination.pptx
MahdiHasanSowrav
 

Semelhante a Ch 4: Footprinting and Social Engineering (20)

CNIT 123: Ch 4: Footprinting and Social Engineering
CNIT 123: Ch 4: Footprinting and Social EngineeringCNIT 123: Ch 4: Footprinting and Social Engineering
CNIT 123: Ch 4: Footprinting and Social Engineering
 
Dafgjgghhghfhjgghjhgy06-Footprinting.pptx
Dafgjgghhghfhjgghjhgy06-Footprinting.pptxDafgjgghhghfhjgghjhgy06-Footprinting.pptx
Dafgjgghhghfhjgghjhgy06-Footprinting.pptx
 
OSINT for Attack and Defense
OSINT for Attack and DefenseOSINT for Attack and Defense
OSINT for Attack and Defense
 
hacking techniques and intrusion techniques useful in OSINT.pptx
hacking techniques and intrusion techniques useful in OSINT.pptxhacking techniques and intrusion techniques useful in OSINT.pptx
hacking techniques and intrusion techniques useful in OSINT.pptx
 
Ch04 Footprinting and Social Engineering
Ch04 Footprinting and Social EngineeringCh04 Footprinting and Social Engineering
Ch04 Footprinting and Social Engineering
 
Chapter 2 for cyber security examination.pptx
Chapter 2 for cyber security examination.pptxChapter 2 for cyber security examination.pptx
Chapter 2 for cyber security examination.pptx
 
Meletis Belsis - Introduction to information security
Meletis Belsis - Introduction to information securityMeletis Belsis - Introduction to information security
Meletis Belsis - Introduction to information security
 
11 Analysis Methodology
11 Analysis Methodology11 Analysis Methodology
11 Analysis Methodology
 
Breadcrumbs to Loaves: BSides Austin '17
Breadcrumbs to Loaves: BSides Austin '17Breadcrumbs to Loaves: BSides Austin '17
Breadcrumbs to Loaves: BSides Austin '17
 
12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)
 
Subdomain Enumeration
Subdomain EnumerationSubdomain Enumeration
Subdomain Enumeration
 
CNIT 152: 3 Pre-Incident Preparation
CNIT 152: 3 Pre-Incident PreparationCNIT 152: 3 Pre-Incident Preparation
CNIT 152: 3 Pre-Incident Preparation
 
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
 
CNIT 152 12 Investigating Windows Systems (Part 2)
CNIT 152 12 Investigating Windows Systems (Part 2)CNIT 152 12 Investigating Windows Systems (Part 2)
CNIT 152 12 Investigating Windows Systems (Part 2)
 
CNIT 121: 3 Pre-Incident Preparation
CNIT 121: 3 Pre-Incident PreparationCNIT 121: 3 Pre-Incident Preparation
CNIT 121: 3 Pre-Incident Preparation
 
Ready set hack
Ready set hackReady set hack
Ready set hack
 
Distributed Sensor Data Contextualization for Threat Intelligence Analysis
Distributed Sensor Data Contextualization for Threat Intelligence AnalysisDistributed Sensor Data Contextualization for Threat Intelligence Analysis
Distributed Sensor Data Contextualization for Threat Intelligence Analysis
 
internet
internetinternet
internet
 
CNIT 152: 12b Windows Registry
CNIT 152: 12b Windows RegistryCNIT 152: 12b Windows Registry
CNIT 152: 12b Windows Registry
 
Hunting on the cheap
Hunting on the cheapHunting on the cheap
Hunting on the cheap
 

Mais de Sam Bowne

Mais de Sam Bowne (20)

Cyberwar
CyberwarCyberwar
Cyberwar
 
3: DNS vulnerabilities
3: DNS vulnerabilities 3: DNS vulnerabilities
3: DNS vulnerabilities
 
8. Software Development Security
8. Software Development Security8. Software Development Security
8. Software Development Security
 
4 Mapping the Application
4 Mapping the Application4 Mapping the Application
4 Mapping the Application
 
3. Attacking iOS Applications (Part 2)
 3. Attacking iOS Applications (Part 2) 3. Attacking iOS Applications (Part 2)
3. Attacking iOS Applications (Part 2)
 
12 Elliptic Curves
12 Elliptic Curves12 Elliptic Curves
12 Elliptic Curves
 
11. Diffie-Hellman
11. Diffie-Hellman11. Diffie-Hellman
11. Diffie-Hellman
 
2a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 12a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 1
 
9 Writing Secure Android Applications
9 Writing Secure Android Applications9 Writing Secure Android Applications
9 Writing Secure Android Applications
 
10 RSA
10 RSA10 RSA
10 RSA
 
12 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 312 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 3
 
9. Hard Problems
9. Hard Problems9. Hard Problems
9. Hard Problems
 
8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)
 
8. Authenticated Encryption
8. Authenticated Encryption8. Authenticated Encryption
8. Authenticated Encryption
 
7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)
 
7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)
 
5. Stream Ciphers
5. Stream Ciphers5. Stream Ciphers
5. Stream Ciphers
 
6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection
 
4. Block Ciphers
4. Block Ciphers 4. Block Ciphers
4. Block Ciphers
 
6 Analyzing Android Applications (Part 2)
6 Analyzing Android Applications (Part 2)6 Analyzing Android Applications (Part 2)
6 Analyzing Android Applications (Part 2)
 

Último

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 

Último (20)

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 

Ch 4: Footprinting and Social Engineering

  • 1. Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Updated 9-27-17
  • 2. Objectives ■ Use Web tools for footprinting ■ Conduct competitive intelligence ■ Describe DNS zone transfers ■ Identify the types of social engineering
  • 3. Using Web Tools for Footprinting ■ “Case the joint” • Look over the location • Find weakness in security systems • Types of locks, alarms ■ In computer jargon, this is called footprinting • Discover information about ■ The organization ■ Its network
  • 4. Table 4-1 Summary of Web tools
  • 5. Table 4-1 Summary of Web tools (cont’d.)
  • 6. Conducting Competitive Intelligence ■ Numerous resources to find information legally ■ Competitive Intelligence • Gathering information using technology ■ Identify methods others can use to find information about your organization ■ Limit amount of information company makes public
  • 7. Analyzing a Company’s Web Site ■ Web pages are an easy source of information ■ Many tools available ■ BurpSuite • Powerful proxy for all platforms (uses Java) • https://portswigger.net/burp/
  • 8. Burp Configuration ■ "Proxy" tab, "Intercept" sub-tab • Adjust to "Intercept is off" ■ "Proxy" tab, "Options" sub-tab • Start running on port 8080
  • 9. Proxy Settings in Firefox ■ At top right, click "3 bars" icon, then the Gear icon ■ In "Advanced", on the "Network" tab, click "Settings”
  • 10. Surf an Insecure Site like ietf.org ■ "HTTP History" tab shows each request and response
  • 11. Surf a Secure Site like samsclass.info ■ Browser detects Burp's MITM attack and warns you
  • 13. Installing the Burp Certificate ▪ On computer, in Firefox, using the proxy, visit http://burp ▪ Click the "CA Certificate" link ▪ Change file extension to .cer ▪ Drag file onto Genymotion phone ▪ On phone, settings, Security, "Install from SD card"
  • 14. Demo: Posting a Long Tweet
  • 15. Other Proxy Functions ▪ Intercept & Modify Requests ▪ Can exploit poorly-made shopping sites ▪ Spider ▪ Finds all the pages in a site ▪ Saves a local copy of them ▪ Scan for vulnerabilities ▪ Get authorization first
  • 16. Other Proxies ■ Zed Attack Proxy from OWASP • Can scan for vulnerabilities ■ Tamper Data • Firefox plug-in for easy interception and alteration of requests ■ Chrome Developer Tools • Click 3-bars, "More Tools", "Developer Tools" • Allows you to examine requests and responses
  • 17. Timeline ■ Shows requests & responses even for secure sites
  • 18. Using Other Footprinting Tools ■ Whois • Commonly used tool • Gathers IP address and domain information • Attackers can also use it ■ Host command • Can look up one IP address, or the whole DNS Zone file ■ All the servers in the domain
  • 19. ARIN Whois from Linux ■ host mit.edu ■ nc whois.arin.net ■ 18.7.22.69 ■ This shows registration information for the domain
  • 20. Sam Spade ■ GUI tool ■ Available for UNIX and Windows ■ Easy to use
  • 22.
  • 23. Using E-mail Addresses ■ E-mail addresses help you retrieve even more information than the previous commands ■ Find e-mail address format • Guess other employees’ e-mail accounts ■ Tool to find corporate employee information • Groups.google.com
  • 24. Using HTTP Basics ■ HTTP operates on port 80 ■ Use HTTP language to pull information from a Web server ■ Basic understanding of HTTP is beneficial for security testers ■ Return codes • Reveal information about server OS
  • 25.
  • 26.
  • 27. Using HTTP Basics (continued) ■ HTTP methods • GET / HTTP/1.1. is the most basic method • Can determine information about server OS from the server’s generated output
  • 28.
  • 30. Using the GET Method
  • 31.
  • 32. Other Methods of Gathering Information ■ Cookies ■ Web bugs
  • 33. Detecting Cookies and Web Bugs ■ Cookie • Text file generated by a Web server • Stored on a user’s browser • Information sent back to Web server when user returns • Used to customize Web pages • Some cookies store personal information ■ Security issue
  • 34. Viewing Cookies ■ In Firefox ■ Tools, Options ■ Privacy tab ■ Show Cookies
  • 35. Detecting Cookies and Web Bugs (continued) ■ Web bug • 1-pixel x 1-pixel image file (usually transparent) • Referenced in an <IMG> tag • Usually works with a cookie • Purpose similar to that of spyware and adware • Comes from third-party companies specializing in data collection
  • 36. Ghostery ■ Firefox & Chrome extension to reveal Web bugs
  • 37. Using Domain Name Service (DNS) Zone Transfers ■ DNS • Resolves host names to IP addresses • People prefer using URLs to IP addresses ■ Zone Transfer tools • Dig • Host
  • 38. Primary DNS Server ■ Determining company’s primary DNS server • Look for the Start of Authority (SOA) record • Shows zones or IP addresses
  • 39. Using dig to find the SOA ■ dig soa mit.edu ■ Shows three servers, with IP addresses ■ This is a start at mapping the MIT network
  • 40. Using (DNS) Zone Transfers ■ Zone Transfer • Enables you to see all hosts on a network • Gives you organization’s network diagram ■ MIT has protected their network – zone transfers no longer work ■ dig @BITSY.mit.edu mit.edu axfr ■ Command fails now
  • 41. Blocking Zone Transfers • See link Ch 4e
  • 42. Introduction to Social Engineering ■ Older than computers ■ Targets the human component of a network ■ Goals • Obtain confidential information (passwords) • Obtain personal information
  • 45. HB Gary Federal Hacked ■ Link Ch 4n
  • 46.
  • 47. Tactics • Persuasion • Intimidation • Coercion • Extortion/blackmailing
  • 48. Introduction to Social Engineering (continued) ■ The biggest security threat to networks ■ Most difficult to protect against ■ Main idea: • “Why to crack a password when you can simply ask for it?” • Users divulge their passwords to IT personnel
  • 49. Social Engineer Studies Human Behavior • Recognize personality traits • Understand how to read body language
  • 50. Introduction to Social Engineering (continued) ■ Techniques • Urgency • Quid pro quo • Status quo • Kindness • Position
  • 51. Preventing Social Engineering ■ Train user not to reveal any information to outsiders ■ Verify caller identity • Ask questions • Call back to confirm ■ Security drills
  • 52.
  • 53.
  • 54.
  • 55. DEF CON Social Engineering Contest ■ Link Ch 4k
  • 56. The Art of Shoulder Surfing ■ Shoulder surfer • Reads what users enter on keyboards ■ Logon names ■ Passwords ■ PINs
  • 57. Tools for Shoulder Surfing ■ Binoculars or telescopes or cameras in cell phones ■ Knowledge of key positions and typing techniques ■ Knowledge of popular letter substitutions • s equals $, a equals @
  • 58. The Art of Shoulder Surfing (continued) ■ Prevention • Avoid typing when someone is nearby • Avoid typing when someone nearby is talking on cell phone • Computer monitors should face away from door or cubicle entryway • Immediately change password if you suspect someone is observing you
  • 59. Dumpster Diving ■ Attacker finds information in victim’s trash • Discarded computer manuals ■ Notes or passwords written in them • Telephone directories • Calendars with schedules • Financial reports • Interoffice memos • Company policy • Utility bills • Resumes of employees
  • 60. The Art of Dumpster Diving (continued) ■ Prevention • Educate your users about dumpster diving • Proper trash disposal • Use “disk shredder” software to erase disks before discarding them ■ Software writes random bits ■ Done at least seven times • Discard computer manuals offsite • Shred documents before disposal
  • 61. Piggybacking ■ Trailing closely behind an employee cleared to enter restricted areas ■ How it works: • Watch authorized personnel enter an area • Quickly join them at security entrance • Exploit the desire of other to be polite and helpful • Attacker wears a fake badge or security card
  • 62. Piggybacking Prevention • Use turnstiles • Train personnel to notify the presence of strangers • Do not hold secured doors for anyone ■ Even for people you know • All employees must use secure cards
  • 63. Phishing ■ Deceptive emails or text messages ■ Can take money, passwords, or install malware on your computer