Practical 1: Finding domain registration details with Whois tool
WHOIS is used to gather information related to the domain name and DNS details of the target.
Enter the following command to perform Whois operation on target. In this case, we are targeting hackerschool.
Traceroute
While the data packet is in transit, it passes through multiple network nodes to reach the destination. If the data packet fails to reach the destination, the user will not know the reason behind the failure; network administrators use traceroute program to trace the packet from source to destination to identify the actual cause of the problem so that they can investigate and resolve the issue.
Traceroute tool is used to extract details about the path that a packet takes from the source to a specific destination.
IP Tracing
The IP address is one of the most critical pieces of information. To attack the target computer, attackers need to identify the IP address of the target computer. Attackers use different techniques to grab the IP address. Sending tracking emails, or SMS, or some malicious links to grab the IP address of the target computer is called as IP Tracing. In other words, extracting user details (like location) based on IP address is known as IP Tracing or IP Lookup.
What if We Skip Footprinting?
We should not skip Footprinting. Hacker or penetration tester’s success will not always depend on sophisticated tools used to perform attacks, but information gathered at Footprinting plays a crucial role in gaining access to the target. Want to know how?
Scenario: Information gathered in this step can help us bypass some security controls for example login credentials for one of the computers in the network may be DOB or first name of the employee. As we know some necessary information about an employee, we can try to guess the username or password by observing hint.
Conclusion: launching attacks without proper knowledge about the target may affect the success of the attack.
Practical 2: Extracting Emails and subdomains details using the harvester
This tool is to gather emails, subdomains, hosts, employee names, open ports and banners from different public sources like Google, Bing and other search engines.
Practical 3: Footprinting domain using Recon-ng tool
To launch the recon-ng tool, execute the following command in terminal. Read the images carefully
Countermeasures
● Revise the information before publishing on blogs, social networking sites, and websites.
● Never upload highly classified documents online.
● Privatize the who is lookup registration details by applying for anonymous registration with the web hosting service provider.
● Never click the link in emails or mobiles, if received from an unknown sender.
● Use pseudo-names in blogs and social networking sites to not leak personal information.
● Avoid opening third-party social networking sites or websites from office premises.
● Use IDS in corporate networks to detect Footprinting attacks done by hackers.
WHOIS is used to gather information related to the domain name and DNS details of the target.
Enter the following command to perform Whois operation on target. In this case, we are targeting hackerschool.
In the same way you can find the details of any website or any company with whois.com
read more about footprinting and the need for footprinting
While the data packet is in transit, it passes through multiple network nodes to reach the destination. If the data packet fails to reach the destination, the user will not know the reason behind the failure; network administrators use traceroute program to trace the packet from source to destination to identify the actual cause of the problem so that they can investigate and resolve the issue.
Traceroute tool is used to extract details about the path that a packet takes from the source to a specific destination.
IP Tracing
The IP address is one of the most critical pieces of information. To attack the target computer, attackers need to identify the IP address of the target computer. Attackers use different techniques to grab the IP address. Sending tracking emails, or SMS, or some malicious links to grab the IP address of the target computer is called as IP Tracing. In other words, extracting user details (like location) based on IP address is known as IP Tracing or IP Lookup.
What if We Skip Footprinting?
We should not skip Footprinting. Hacker or penetration tester’s success will not always depend on sophisticated tools used to perform attacks, but information gathered at Footprinting plays a crucial role in gaining access to the target. Want to know how?
Scenario: Information gathered in this step can help us bypass some security controls for example login credentials for one of the computers in the network may be DOB or first name of the employee. As we know some necessary information about an employee, we can try to guess the username or password by observing hint.
Conclusion: launching attacks without proper knowledge about the target may affect the success of the attack.
Practical 2: Extracting Emails and subdomains details using the harvester
This tool is to gather emails, subdomains, hosts, employee names, open ports and banners from different public sources like Google, Bing and other search engines.
To launch the recon-ng tool, execute the following command in terminal. Read the images carefully
● Revise the information before publishing on blogs, social networking sites, and websites.
● Never upload highly classified documents online.
● Privatize the who is lookup registration details by applying for anonymous registration with the web hosting service provider.
● Never click the link in emails or mobiles, if received from an unknown sender.
● Use pseudo-names in blogs and social networking sites to not leak personal information.
● Avoid opening third-party social networking sites or websites from office premises.
● Use IDS in corporate networks to detect Footprinting attacks done by hackers.










No comments:
Post a Comment