Chapter 4 Footprinting & Reconnaissance Flashcards

1
Q

PHASE 1 of the ethical hacking process!!

A

Footprinting - PASSIVELY gaining info about target

i.e. want just enough data to plan next phase of scanning

includes IP address ranges, Namespaces, Employee info, phone #s, facility info, job info, OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Phase 2

A

Scanning - ACTIVELY gaining info; footprinting helps identify targets but not all may be active, which is where scanning takes place

includes locating active hosts to target in later phase, pings, ping sweeps, port scans, tracert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Phase 3

A

Enumeration - systematic probing of target w/ goal of obtaining user lists, routing tables, & protocols from the system; shifting from outside to inside to gather data

includes shares, users, groups, applications, protocols, banners, usernames, group info, passwords, device info, NW layout, services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Phase 4

A

System Hacking - methodical approach including cracking passwords, escalating privileges, executing apps, hiding files, covering tracks, concealing evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Footprinting, or reconnaissance

A

method of observing & collecting info about potential target w/ the intention of finding a way to attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Finding NW information –> using ping and tracert

A

1) ping facebook.com –> IP address return + RTT (idea of connections performance & quality)

2) determine frame size on NW
ping facebook.com -f -l 1300
if pack is fragmented, decrease value until results show up

3) tracert
reveals info about path from local host to remote host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Terminology in Footprinting

A

1) Open source & Passive info gathering - using public resources to find info
2) Active Info gathering - engaging target for info (i.e. social engineering)
3) Pseudonymous Footprinting - gathering info from online sources posted by someone from the target but under a diff name
4) Internet Footprinting - using the internet to gain info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The Footprinting process

A

-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Using Search Engines

A

search through a lot of different engines;

Major search engines have an alert system for any updates that occur such as Google

after using search engines, move onto looking for information relating to the URL

Archive.org (aka The Wayback Machine) allows you to find archived copies of websites form which you can extract information

Netcraft - suite of tools used to obtain web server version, IP address, subnet data, OS info, subdomain info

Link Extractor - this tool locates & extracts the internal and external URLs for a given location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Public & Restricted Websites

A

websites that are not intended to be public but to be restricted to a few

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Location and Geography

A

important to know location for dumpster diving, social engineering, & other techniques

use people search, google maps, google earth,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Social Networking & Information Gathering

A

can learn all about an individual and their relationships; good for social engineering

Maltego - a app that illustrates relationship between people, gruops, companies, etc (illustrates the dangers of social networking)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Financial Services for Info Gathering

A

Finance websites allows you to gather info about company officers, profiles, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Job Sites for Info

A

job postings tend to have a statement of desired skill sets, this can have important details such as OS info, HW info, employer/employee profile, SW info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Email for info

A

http://whoreadme.com –> allows you to track emails & provides info on OS, browster type, location, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Competitive Analysis

A

establishing what makes your product or service unique; looking at what competitors are doing to see how your target is moving

reports provide info such as project data, financial status, etc

Tools such as EDGAR (reports), LexisNexis (news), BusinessWire (status), CNBC (future plans)

17
Q

Google Hacking

A

using advanced operators to fine-tune your results;

can obtain passwords, sensitive folders, logon portals, etc

Examples of operators include:

1) cache:
2) link:
- —Finding websites that have linked to the page
3) info:
4) site:
5) allintitle:
- –Returns websites w/ specified words in their title
6) allinurl:
7) filetype:

For more: www.exploit-db.com/google-dorks/

18
Q

Gaining NW info

A

Whois - find domain name, IP info, etc

Tracert - follow the path of traffic from one point to another, find relative performance and latency between hops; find server names, etc

19
Q

Social Engineering Techniques (though not part of Footprinting)

A

Eavesdropping - listening in on convos

Shoulder surfing - standing behind someone while they are on their computer

Dumpster Diving - going through victim’s trash

20
Q

DNS for Zone Transfers PORT #

A

53 TCP