You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Footprinting using advanced Google Hacking Techniques
Using technique to locate specific strings of text within search results using an advanced operator in the search engine (finding vulnerable targets), Google Operators to locate specific strings of text, GHDB
Footprinting through social networking sites
Fake identifies of co-workers, finding personal info, tracking their groups, etc, Facebook, Twitter, LinkedIn etc
Website Footprinting
Looking at system information from websites, personal information, examining HTML source comments, Web Spiders, archive.org, mirroring sites etc
Email Footprinting
Can get recipient's IP address, Geolocation, Email Received and Read, Read Duration, Proxy Detection, Links, OS and Browser info, Forward Email
Competitive Intelligence
Competitive Intelligence gathering is the process of identifying, gathering, analyzing, and verifying, and using the information about your competitors from sources such as the internet. Monitoring web traffic etc.
Non-interfering and subtle in nature
This method is legal
WHOIS Footprinting
WHOIS databases are maintained by regional internet registries and contain PI of domain owners
DNS Footprinting
Attacker can gather DNS information to determine key hosts in the network
Network Footprinting
Network range information assists attackers to create a map of the target network
Find the range of IP addresses using ARIN whois database search
Traceroute programs work on the concept of ICMP protocol and use the TTL field in the header of ICMP packets to discover on the path to a target host
Footprinting through Social Engineering
Art in exploiting human behaviour to extract confidential information
Social engineers depend on the fact that people are unaware
Tools
Maltego
Recon-NG (Web Reconnaissance Framework)
Countermeasures
Restrict the employees to access social networking sites
Configure web servers to avoid information leakage
Educate employees to use pseudonyms
Limit the amount of information that you are publishing
Use footprinting techniques to discover and remove sensitive information
Use anonymous registration services
Enforce security policies
Penetration Testing: Footprinting
Footprinting pen testing is used to determine organization’s public available information
Tester attempts to gather as much information as possible from the internet and other publicly accessible sources
Define scope and then use footprint search engines