📝
Home
Pentesting
  • 📝Home
  • ⚒️PENTESTING
    • Foundational
      • Gaining Access
      • Session Hijacking
      • Buffer Overflows
        • Finding the Offset
        • Spiking
        • Fuzzing
      • Attack Basics
        • Brute Force Attacks
        • Credential Stuffing and Password Spraying
        • Netcat Shell Stabilization
        • Reverse Shells vs Bind Shells
        • Staged vs Non-Staged Payloads
      • Footprinting
    • Reconnaissance
      • Discovering Email Addresses
      • Hunting Subdomains
    • Scanning and Enumeration
      • Banner Grabbing
      • Enumerating HTTP and HTTPS
      • Enumerating SMB
      • Enumerating SSH
      • NetBIOS Enumeration
      • SNMP Enumeration
      • Sniffing
    • Privilege Escalation
      • 🐧Linux Privilege Escalation
      • 🪟Windows Privilege Escalation
        • Initial Enumeration
    • Defense Evasion
      • Hiding Files and Covering Tracks
      • Network Evasion
    • Attacking Services
      • Attacking Kerberos
      • Attacking VPNs
      • Denial of Service
      • Exploiting FTP
      • Exploiting NFS
      • Exploiting SMTP
      • Exploiting Telnet
    • Attacking Active Directory
      • Initial Attack Vectors
        • Gaining Shell Access
        • LLMNR Poisoning
        • SMB Relay
        • Passback Attacks
        • IPv6 Attacks
      • Post-Compromise Enumeration
        • Bloodhound
        • ldapdomaindump
        • PowerView
        • PlumHound
      • Post-Compromise Attacks
        • GPP Attacks
        • Print Nightmare
        • Token Impersonation using Incognito
        • URL File Attack
        • Pass Attacks
        • Kerberoasting
        • LNK File Attacks
        • Mimikatz
      • Post-Domain Compromise Attacks
        • Dumping the NTDS.dit
        • Golden Ticket Attacks
      • Post Exploitation
    • Toolkit
      • Burp Suite
        • Intruder
      • Hping
        • Crafting TCP and UDP Packets
      • Metasploit
        • Meterpreter
        • Shell Handler
        • Gather Information
        • Gaining Root
    • Web Application Hacking
      • Attack Methodology
      • Attacking Web Applications
      • Authentication Bypass
      • Cross-Site Scripting
      • Cross-Site Request Forgery
      • File Inclusion
      • Server-Side Request Forgery
      • Injection
        • Command Injection
        • LDAP Injection
        • SQL Injection
  • 👽MALWARE ANALYSIS
    • Malware Analysis Primer
    • Malware Types
      • Rootkits
      • Viruses
      • WannaCry
    • Analyzing Malicious Windows Programs
    • Static Analysis
      • Basic Static Techniques
      • Advanced Static Analysis
    • Reverse Engineering
      • Crash Course in x86 Disassembly
      • Recognizing Code in Assembly Language
    • Dynamic Analysis
    • Detecting Malware
      • Evasion Techniques
      • Detecting Mimikatz
      • Hunting Malware
      • Hunting Metasploit
      • Hunting Persistence
  • 🏹THREAT HUNTING
    • Foundational
      • ATT&CK Framework
      • CIA Triad
    • APTs
  • 🐍PROGRAMMING & SCRIPTING
    • Foundational
      • Computer Memory
    • C Programming
    • Assembly Language
      • Assembly File Structure
      • Debugging with gdb
    • Bash
    • Python
      • Foundational
        • Booleans and Operators
        • Comprehensions
        • Conditionals
        • Dictionaries
        • Exceptions and Error Handling
        • Functions
        • Lambdas
        • Lists
        • Loops
        • Modules
        • Numbers
        • Reading and Writing Files
        • Sets
        • Sockets
        • String Formatting
        • Tuples
        • User Input
        • Variables
      • Extending Python
        • Virtual Environments
        • Sys Module
        • Requests
        • pwntools
    • Regular Expressions
    • SQL
  • 🕵️DIGITAL FORENSICS
    • Anti-Forensic Techniques
    • 🪟Windows Security Internals
      • Windows Security Internals
        • Kernel
          • Security Reference Monitor (SRM)
          • Object Manager
            • System Calls
            • NTSTATUS Codes
            • Object Handles
            • Query and Set Information System Calls
          • The I/O Manager & The Process and Thread Manager
          • The Memory Manager
          • The Configuration Manager
  • 💼GRC (CISSP Notes)
    • Security Assessment and Testing
    • Security Governance Principles
    • Security Policies Standards and Procedures
    • Preventing and Responding to Incidents
    • Organizational Roles and Responsibilities
    • Organizational Processes
  • 📦Networking
    • Foundational
      • DHCP
      • DNS Basics
      • HTTP Protocol
      • IPSec
      • IPv6 Fundamentals
    • Wireless Technologies
      • 802.11
      • Bluetooth
      • Wireless Authentication
      • Wireless Encryption
Powered by GitBook
On this page
  • What is the difference between reconnaissance and footprinting?
  • Types of information we try to gather during fingerprinting
  • What is anonymous footprinting?
  • What is pseudonymous footprinting?
  • What are the four main focuses and benefits of footprinting?
  • Active footprinting vs passive footprinting
  • What is social engineering?
  • Footprinting Methods and Tools
  • What is website footprinting?
  • What is email footprinting?
  • What is DNS footprinting?
  • Network Footprinting
  • What are some of the applications found in the OSRFramework?
  1. PENTESTING
  2. Foundational

Footprinting

What is the difference between reconnaissance and footprinting?

  • Recon is more of an umbrella term for gathering information on targets

  • Footprinting is more of an effort to map out, at a high level what the target landscape looks like.

Types of information we try to gather during fingerprinting

  • High level network architecture ( types of routers or servers they are using )

  • Applications and websites

  • Physical security measures in place

  • Employee daily routines

What is anonymous footprinting?

  • Anonymous footprinting is when you try to hide the source of all the information gathering

What is pseudonymous footprinting?

  • Pseudonymous footprinting is when you make someone else take the blame for your actions.

What are the four main focuses and benefits of footprinting?

  1. Know the security posture

  2. Reduce the focus area

  3. Identify vulnerabilities

  4. Draw a network map

Active footprinting vs passive footprinting

  • Active footprinting requires the attacker to touch the device, network or resource

    • Methods include

      • Social Engineering

      • Human Interaction

      • Anything that requires the hacker to interact with the organization

  • Passive footprinting is all about the gathering publicly accessible information and not so much about how you are going about getting it.

    • Methods include

      • Gathering of competitive intelligence (refers to the information gathered by business entity about its competitors' customers, products, and marketing)

      • Using search engines

      • Perusing social media sites

      • Dumpster diving

      • Gaining network IP ranges

      • Using DNS records for information

What is social engineering?

  • Social Engineering boils down to convincing people to reveal sensitive information

Footprinting Methods and Tools

  • What is Google Hacking?

    • Google Hacking is manipulating a search string with additional operators to search the web for vulnerabilities

What is website footprinting?

  • Website footprinting is analyzing a website from afar and can show things like:

    • Software in use

    • OS

    • filenames

    • paths

    • contact details

  • Website footprinting tools

    • Burp Suite

    • Firebug

    • Website Informer

    • SpiderFoot

    • XProbe

    • P0f

    • Recon-ng

  • Web Mirroring is a method for footprinting where you copy a website directly to your system

    • Web Mirorring tools

      • HTTrack

      • Black Widow

      • WebRipper

      • Teleport Pro

      • GNU Wget

      • Backstreet Browser

      • WebCopier Pro

      • SurfOffline

What is email footprinting?

  • Email communication can provide IP address and physical location information

  • Email footprinting tools

    • GetNotify

    • ContactMonkey

    • Yesware

    • Read Notify

    • WhoReadMe

    • MSGTAG

    • Trace Email

    • Zendio

What is DNS footprinting?

  • DNS Records provide a wealth of footprinting information for the ethical hacker

  • nslookup - provides a means to query DNS servers for information

  • nslookup can also provide a zone transfer, pulling every record from the DNS server. Here are instructions on how to do this

nslookup [-options] {hostname | [-server]}
  1. Enter nslookup at the command line.

  2. Type server , using the IP address of the SOA

  3. Type set type=any and press Enter

Network Footprinting


  • traceroute

    • a command line tool that tracks a packet across the internet and provides the route path and transit times.

    • uses ICMP ECHO packets (UDP in Linux) to report information on each hop form the source to the destination

    • Windows uses tracert using ICMP only

    • Linux uses traceroute using UDP only

  • What is the OSRFramework?

    • The OSRFramework is an open source research framework in Python that helps you to perform user profiling by using different OSINT tools.

    • Basically a set of libraries used to perform Open Source Intelligence (OSINT) that helps you gather more accurate data using multiple applications in one easy to use package

    • Some of the information you can find are:

      • username

      • domain

      • phone number

      • DNS lookups

      • Information leaks research

      • deep web search

What are some of the applications found in the OSRFramework?

  • mailfy.py - checks if a user name (e-mail) has been registered in up to 22 different e-mail providers

Other tools

  • Web Spiders - applications that crawl through a website, reporting information on what they find.

  • Social Engineering Framework (SEF) - can automate things like extracting email addresses out of websites and general preparation for social engineering. It has ties into Metasploit payloads for easy phishing attacks.

  • Maltego - an open source intelligence and forensics application designed explicitly to demonstrate social engineering (and other weaknesses for your environment

PreviousStaged vs Non-Staged PayloadsNextReconnaissance

Last updated 1 year ago

Type ls -d , where domainname.com is the name of the zone, and then press Enter.

- looks for profiles using full names and other information in seven platforms. This queries the OSRFramework platforms itself.

- verifies the existence of a given domain

- checks for the existence of phone numbers, can also be used to check if a phone number has been linked to spam practices.

- looks for regular expressions

- verifies if a user name / profile exists in up to 306 different platforms

⚒️
domainname.com
searchfy.py
domainfy.py
phonefy.py
entify.py
usufy.py