Ch 4: Footprinting and Social Engineering

Sam Bowne
Sam BowneInstructor at CCSF
Hands-On Ethical Hacking
and Network Defense
Chapter 4
Footprinting and Social Engineering
Updated 9-27-17
Objectives
■ Use Web tools for footprinting
■ Conduct competitive intelligence
■ Describe DNS zone transfers
■ Identify the types of social
engineering
Using Web Tools for Footprinting
■ “Case the joint”
• Look over the location
• Find weakness in security systems
• Types of locks, alarms
■ In computer jargon, this is called
footprinting
• Discover information about
■ The organization
■ Its network
Table 4-1 Summary of Web tools
Table 4-1 Summary of Web tools (cont’d.)
Conducting Competitive Intelligence
■ Numerous resources to find
information legally
■ Competitive Intelligence
• Gathering information using technology
■ Identify methods others can use to find
information about your organization
■ Limit amount of information company
makes public
Analyzing a Company’s Web Site
■ Web pages are an easy source of
information
■ Many tools available
■ BurpSuite
• Powerful proxy for all platforms (uses
Java)
• https://portswigger.net/burp/
Burp Configuration
■ "Proxy" tab, "Intercept" sub-tab
• Adjust to "Intercept is off"
■ "Proxy" tab, "Options" sub-tab
• Start running on port 8080
Proxy Settings in Firefox
■ At top right, click "3
bars" icon, then the
Gear icon
■ In "Advanced", on the
"Network" tab, click
"Settings”
Surf an Insecure Site like ietf.org
■ "HTTP History" tab shows each
request and response
Surf a Secure Site like samsclass.info
■ Browser detects Burp's MITM attack
and warns you
Demo: Stitcher
Installing the Burp Certificate
▪ On computer, in Firefox, using the
proxy, visit http://burp
▪ Click the "CA Certificate" link
▪ Change file extension to .cer
▪ Drag file onto Genymotion phone
▪ On phone, settings, Security, "Install
from SD card"
Demo: Posting a Long Tweet
Other Proxy Functions
▪ Intercept & Modify Requests
▪ Can exploit poorly-made shopping sites
▪ Spider
▪ Finds all the pages in a site
▪ Saves a local copy of them
▪ Scan for vulnerabilities
▪ Get authorization first
Other Proxies
■ Zed Attack Proxy from OWASP
• Can scan for vulnerabilities
■ Tamper Data
• Firefox plug-in for easy interception and
alteration of requests
■ Chrome Developer Tools
• Click 3-bars, "More Tools", "Developer
Tools"
• Allows you to examine requests and
responses
Timeline
■ Shows requests & responses even for
secure sites
Using Other Footprinting Tools
■ Whois
• Commonly used tool
• Gathers IP address and domain
information
• Attackers can also use it
■ Host command
• Can look up one IP address, or the whole
DNS Zone file
■ All the servers in the domain
ARIN Whois
from Linux
■ host mit.edu
■ nc whois.arin.net
■ 18.7.22.69
■ This shows
registration
information for the
domain
Sam Spade
■ GUI tool
■ Available
for UNIX
and
Windows
■ Easy to use
Maltego
Ch 4: Footprinting and Social Engineering
Using E-mail Addresses
■ E-mail addresses help you retrieve
even more information than the
previous commands
■ Find e-mail address format
• Guess other employees’ e-mail accounts
■ Tool to find corporate employee
information
• Groups.google.com
Using HTTP Basics
■ HTTP operates on port 80
■ Use HTTP language to pull
information from a Web server
■ Basic understanding of HTTP is
beneficial for security testers
■ Return codes
• Reveal information about server OS
Ch 4: Footprinting and Social Engineering
Ch 4: Footprinting and Social Engineering
Using HTTP Basics (continued)
■ HTTP methods
• GET / HTTP/1.1. is the most basic
method
• Can determine information about server
OS from the server’s generated output
Ch 4: Footprinting and Social Engineering
Using the OPTIONS Method
Using the GET Method
Ch 4: Footprinting and Social Engineering
Other Methods of Gathering
Information
■ Cookies
■ Web bugs
Detecting Cookies and Web Bugs
■ Cookie
• Text file generated by a Web server
• Stored on a user’s browser
• Information sent back to Web server
when user returns
• Used to customize Web pages
• Some cookies store personal information
■ Security issue
Viewing Cookies
■ In Firefox
■ Tools, Options
■ Privacy tab
■ Show Cookies
Detecting Cookies and Web Bugs
(continued)
■ Web bug
• 1-pixel x 1-pixel image file (usually
transparent)
• Referenced in an <IMG> tag
• Usually works with a cookie
• Purpose similar to that of spyware and
adware
• Comes from third-party companies
specializing in data collection
Ghostery
■ Firefox & Chrome extension to reveal Web bugs
Using Domain Name Service (DNS)
Zone Transfers
■ DNS
• Resolves host names to IP addresses
• People prefer using URLs to IP addresses
■ Zone Transfer tools
• Dig
• Host
Primary DNS Server
■ Determining company’s primary DNS
server
• Look for the Start of Authority (SOA)
record
• Shows zones or IP addresses
Using dig to find the SOA
■ dig soa mit.edu
■ Shows three
servers, with IP
addresses
■ This is a start at
mapping the MIT
network
Using (DNS) Zone Transfers
■ Zone Transfer
• Enables you to see all hosts on a
network
• Gives you organization’s network
diagram
■ MIT has protected their network – zone
transfers no longer work
■ dig @BITSY.mit.edu mit.edu axfr
■ Command fails now
Blocking Zone Transfers
• See link Ch 4e
Introduction to Social Engineering
■ Older than computers
■ Targets the human component of a
network
■ Goals
• Obtain confidential information
(passwords)
• Obtain personal information
■ Link Ch 4l
■ Link Ch 4m
HB Gary Federal Hacked
■ Link Ch 4n
Ch 4: Footprinting and Social Engineering
Tactics
• Persuasion
• Intimidation
• Coercion
• Extortion/blackmailing
Introduction to Social Engineering
(continued)
■ The biggest security threat to networks
■ Most difficult to protect against
■ Main idea:
• “Why to crack a password when you can
simply ask for it?”
• Users divulge their passwords to IT
personnel
Social Engineer Studies Human
Behavior
• Recognize personality traits
• Understand how to read body language
Introduction to Social Engineering
(continued)
■ Techniques
• Urgency
• Quid pro quo
• Status quo
• Kindness
• Position
Preventing Social Engineering
■ Train user not to reveal any
information to outsiders
■ Verify caller identity
• Ask questions
• Call back to confirm
■ Security drills
Ch 4: Footprinting and Social Engineering
Ch 4: Footprinting and Social Engineering
Ch 4: Footprinting and Social Engineering
DEF CON Social Engineering Contest
■ Link Ch 4k
The Art of Shoulder Surfing
■ Shoulder surfer
• Reads what users enter on keyboards
■ Logon names
■ Passwords
■ PINs
Tools for Shoulder Surfing
■ Binoculars or telescopes or cameras
in cell phones
■ Knowledge of key positions and
typing techniques
■ Knowledge of popular letter
substitutions
• s equals $, a equals @
The Art of Shoulder Surfing
(continued)
■ Prevention
• Avoid typing when someone is nearby
• Avoid typing when someone nearby is
talking on cell phone
• Computer monitors should face away
from door or cubicle entryway
• Immediately change password if you
suspect someone is observing you
Dumpster Diving
■ Attacker finds information in victim’s
trash
• Discarded computer manuals
■ Notes or passwords written in them
• Telephone directories
• Calendars with schedules
• Financial reports
• Interoffice memos
• Company policy
• Utility bills
• Resumes of employees
The Art of Dumpster Diving (continued)
■ Prevention
• Educate your users about dumpster
diving
• Proper trash disposal
• Use “disk shredder” software to erase
disks before discarding them
■ Software writes random bits
■ Done at least seven times
• Discard computer manuals offsite
• Shred documents before disposal
Piggybacking
■ Trailing closely behind an employee
cleared to enter restricted areas
■ How it works:
• Watch authorized personnel enter an area
• Quickly join them at security entrance
• Exploit the desire of other to be polite
and helpful
• Attacker wears a fake badge or security
card
Piggybacking Prevention
• Use turnstiles
• Train personnel to notify the presence of
strangers
• Do not hold secured doors for anyone
■ Even for people you know
• All employees must use secure cards
Phishing
■ Deceptive emails or text messages
■ Can take money, passwords, or install
malware on your computer
Ch 4: Footprinting and Social Engineering
1 of 64

Recommended

Dos attack by
Dos attackDos attack
Dos attackManjushree Mashal
1.7K views5 slides
Ch 11: Hacking Wireless Networks by
Ch 11: Hacking Wireless NetworksCh 11: Hacking Wireless Networks
Ch 11: Hacking Wireless NetworksSam Bowne
4.8K views89 slides
Ch 10: Hacking Web Servers by
Ch 10: Hacking Web ServersCh 10: Hacking Web Servers
Ch 10: Hacking Web ServersSam Bowne
10.3K views76 slides
Password Cracking by
Password Cracking Password Cracking
Password Cracking Sina Manavi
23.6K views26 slides
Ch 5: Port Scanning by
Ch 5: Port ScanningCh 5: Port Scanning
Ch 5: Port ScanningSam Bowne
4K views50 slides
Types of attacks by
Types of attacksTypes of attacks
Types of attacksVivek Gandhi
22.7K views25 slides

More Related Content

What's hot

Penetration testing reporting and methodology by
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodologyRashad Aliyev
5.3K views18 slides
Ethical Hacking PPT (CEH) by
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Umesh Mahawar
3.5K views22 slides
Penetration Testing Basics by
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing BasicsRick Wanner
12.7K views62 slides
CNIT 123 Ch 1: Ethical Hacking Overview by
CNIT 123 Ch 1: Ethical Hacking OverviewCNIT 123 Ch 1: Ethical Hacking Overview
CNIT 123 Ch 1: Ethical Hacking OverviewSam Bowne
7.9K views30 slides
Computer security concepts by
Computer security conceptsComputer security concepts
Computer security conceptsG Prachi
9.1K views45 slides
Denial of service attack by
Denial of service attackDenial of service attack
Denial of service attackKaustubh Padwad
7.4K views12 slides

What's hot(20)

Penetration testing reporting and methodology by Rashad Aliyev
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodology
Rashad Aliyev5.3K views
Ethical Hacking PPT (CEH) by Umesh Mahawar
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)
Umesh Mahawar3.5K views
Penetration Testing Basics by Rick Wanner
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing Basics
Rick Wanner12.7K views
CNIT 123 Ch 1: Ethical Hacking Overview by Sam Bowne
CNIT 123 Ch 1: Ethical Hacking OverviewCNIT 123 Ch 1: Ethical Hacking Overview
CNIT 123 Ch 1: Ethical Hacking Overview
Sam Bowne7.9K views
Computer security concepts by G Prachi
Computer security conceptsComputer security concepts
Computer security concepts
G Prachi9.1K views
Vulnerabilities in modern web applications by Niyas Nazar
Vulnerabilities in modern web applicationsVulnerabilities in modern web applications
Vulnerabilities in modern web applications
Niyas Nazar1.5K views
Ethical Hacking n VAPT presentation by Suvrat jain by Suvrat Jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jain
Suvrat Jain6.5K views
Intrusion Detection Systems and Intrusion Prevention Systems by Cleverence Kombe
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems
Cleverence Kombe2.8K views
NETWORK PENETRATION TESTING by Er Vivek Rana
NETWORK PENETRATION TESTINGNETWORK PENETRATION TESTING
NETWORK PENETRATION TESTING
Er Vivek Rana5.6K views
Password Cracking by Sagar Verma
Password CrackingPassword Cracking
Password Cracking
Sagar Verma4.6K views
Intrusion detection by CAS
Intrusion detectionIntrusion detection
Intrusion detection
CAS3.7K views
DDoS Attack PPT by Nitin Bisht by Nitin Bisht
DDoS Attack  PPT by Nitin BishtDDoS Attack  PPT by Nitin Bisht
DDoS Attack PPT by Nitin Bisht
Nitin Bisht11.8K views
Footprinting and reconnaissance by NishaYadav177
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissance
NishaYadav177507 views
Internet Security by Mitesh Gupta
Internet SecurityInternet Security
Internet Security
Mitesh Gupta6.3K views

Viewers also liked

CNIT 127 Ch 2: Stack overflows on Linux by
CNIT 127 Ch 2: Stack overflows on LinuxCNIT 127 Ch 2: Stack overflows on Linux
CNIT 127 Ch 2: Stack overflows on LinuxSam Bowne
1K views54 slides
CNIT 128: 6: Mobile services and mobile Web (part 1: Beginning Through OAuth) by
CNIT 128: 6: Mobile services and mobile Web (part 1: Beginning Through OAuth)CNIT 128: 6: Mobile services and mobile Web (part 1: Beginning Through OAuth)
CNIT 128: 6: Mobile services and mobile Web (part 1: Beginning Through OAuth)Sam Bowne
421 views56 slides
CNIT 128 Ch 6: Mobile services and mobile Web (part 2: SAML to end) by
CNIT 128 Ch 6: Mobile services and mobile Web (part 2: SAML to end)CNIT 128 Ch 6: Mobile services and mobile Web (part 2: SAML to end)
CNIT 128 Ch 6: Mobile services and mobile Web (part 2: SAML to end)Sam Bowne
742 views56 slides
Ch 8: Desktop and Server OS Vulnerabilites by
Ch 8: Desktop and Server OS VulnerabilitesCh 8: Desktop and Server OS Vulnerabilites
Ch 8: Desktop and Server OS VulnerabilitesSam Bowne
1K views66 slides
Ch 9: Embedded Operating Systems: The Hidden Threat by
Ch 9: Embedded Operating Systems: The Hidden ThreatCh 9: Embedded Operating Systems: The Hidden Threat
Ch 9: Embedded Operating Systems: The Hidden ThreatSam Bowne
3.4K views51 slides
Ch 3: Network and Computer Attacks by
Ch 3: Network and Computer AttacksCh 3: Network and Computer Attacks
Ch 3: Network and Computer AttacksSam Bowne
1.7K views53 slides

Viewers also liked(20)

CNIT 127 Ch 2: Stack overflows on Linux by Sam Bowne
CNIT 127 Ch 2: Stack overflows on LinuxCNIT 127 Ch 2: Stack overflows on Linux
CNIT 127 Ch 2: Stack overflows on Linux
Sam Bowne1K views
CNIT 128: 6: Mobile services and mobile Web (part 1: Beginning Through OAuth) by Sam Bowne
CNIT 128: 6: Mobile services and mobile Web (part 1: Beginning Through OAuth)CNIT 128: 6: Mobile services and mobile Web (part 1: Beginning Through OAuth)
CNIT 128: 6: Mobile services and mobile Web (part 1: Beginning Through OAuth)
Sam Bowne421 views
CNIT 128 Ch 6: Mobile services and mobile Web (part 2: SAML to end) by Sam Bowne
CNIT 128 Ch 6: Mobile services and mobile Web (part 2: SAML to end)CNIT 128 Ch 6: Mobile services and mobile Web (part 2: SAML to end)
CNIT 128 Ch 6: Mobile services and mobile Web (part 2: SAML to end)
Sam Bowne742 views
Ch 8: Desktop and Server OS Vulnerabilites by Sam Bowne
Ch 8: Desktop and Server OS VulnerabilitesCh 8: Desktop and Server OS Vulnerabilites
Ch 8: Desktop and Server OS Vulnerabilites
Sam Bowne1K views
Ch 9: Embedded Operating Systems: The Hidden Threat by Sam Bowne
Ch 9: Embedded Operating Systems: The Hidden ThreatCh 9: Embedded Operating Systems: The Hidden Threat
Ch 9: Embedded Operating Systems: The Hidden Threat
Sam Bowne3.4K views
Ch 3: Network and Computer Attacks by Sam Bowne
Ch 3: Network and Computer AttacksCh 3: Network and Computer Attacks
Ch 3: Network and Computer Attacks
Sam Bowne1.7K views
Ch 2: TCP/IP Concepts Review by Sam Bowne
Ch 2: TCP/IP Concepts ReviewCh 2: TCP/IP Concepts Review
Ch 2: TCP/IP Concepts Review
Sam Bowne3.9K views
Ch 6: Enumeration by Sam Bowne
Ch 6: EnumerationCh 6: Enumeration
Ch 6: Enumeration
Sam Bowne3.1K views
Ch 7: Programming for Security Professionals by Sam Bowne
Ch 7: Programming for Security ProfessionalsCh 7: Programming for Security Professionals
Ch 7: Programming for Security Professionals
Sam Bowne2K views
Ch 12: Cryptography by Sam Bowne
Ch 12: CryptographyCh 12: Cryptography
Ch 12: Cryptography
Sam Bowne3.4K views
Ch 13: Network Protection Systems by Sam Bowne
Ch 13: Network Protection SystemsCh 13: Network Protection Systems
Ch 13: Network Protection Systems
Sam Bowne1.9K views
CNIT 128 5: Mobile malware by Sam Bowne
CNIT 128 5: Mobile malwareCNIT 128 5: Mobile malware
CNIT 128 5: Mobile malware
Sam Bowne593 views
CNIT 127 Lecture 7: Intro to 64-Bit Assembler (not in book) by Sam Bowne
CNIT 127 Lecture 7: Intro to 64-Bit Assembler (not in book)CNIT 127 Lecture 7: Intro to 64-Bit Assembler (not in book)
CNIT 127 Lecture 7: Intro to 64-Bit Assembler (not in book)
Sam Bowne1.2K views
CNIT 127: Ch 8: Windows overflows (Part 2) by Sam Bowne
CNIT 127: Ch 8: Windows overflows (Part 2)CNIT 127: Ch 8: Windows overflows (Part 2)
CNIT 127: Ch 8: Windows overflows (Part 2)
Sam Bowne646 views
CNIT 126 7: Analyzing Malicious Windows Programs by Sam Bowne
CNIT 126 7: Analyzing Malicious Windows ProgramsCNIT 126 7: Analyzing Malicious Windows Programs
CNIT 126 7: Analyzing Malicious Windows Programs
Sam Bowne1.9K views
CNIT 127 14: Protection Mechanisms by Sam Bowne
CNIT 127 14: Protection MechanismsCNIT 127 14: Protection Mechanisms
CNIT 127 14: Protection Mechanisms
Sam Bowne931 views
CNIT 126 6: Recognizing C Code Constructs in Assembly by Sam Bowne
CNIT 126 6: Recognizing C Code Constructs in Assembly CNIT 126 6: Recognizing C Code Constructs in Assembly
CNIT 126 6: Recognizing C Code Constructs in Assembly
Sam Bowne1.2K views
CNIT 126 5: IDA Pro by Sam Bowne
CNIT 126 5: IDA Pro CNIT 126 5: IDA Pro
CNIT 126 5: IDA Pro
Sam Bowne2.1K views
CISSP Prep: Ch 3. Asset Security by Sam Bowne
CISSP Prep: Ch 3. Asset SecurityCISSP Prep: Ch 3. Asset Security
CISSP Prep: Ch 3. Asset Security
Sam Bowne2.6K views
CNIT 121: 9 Network Evidence by Sam Bowne
CNIT 121: 9 Network EvidenceCNIT 121: 9 Network Evidence
CNIT 121: 9 Network Evidence
Sam Bowne1.1K views

Similar to Ch 4: Footprinting and Social Engineering

CNIT 123: Ch 4: Footprinting and Social Engineering by
CNIT 123: Ch 4: Footprinting and Social EngineeringCNIT 123: Ch 4: Footprinting and Social Engineering
CNIT 123: Ch 4: Footprinting and Social EngineeringSam Bowne
777 views62 slides
OSINT for Attack and Defense by
OSINT for Attack and DefenseOSINT for Attack and Defense
OSINT for Attack and DefenseAndrew McNicol
9.8K views46 slides
Ch04 Footprinting and Social Engineering by
Ch04 Footprinting and Social EngineeringCh04 Footprinting and Social Engineering
Ch04 Footprinting and Social Engineeringphanleson
1.6K views47 slides
Meletis Belsis - Introduction to information security by
Meletis Belsis - Introduction to information securityMeletis Belsis - Introduction to information security
Meletis Belsis - Introduction to information securityMeletis Belsis MPhil/MRes/BSc
365 views49 slides
11 Analysis Methodology by
11 Analysis Methodology11 Analysis Methodology
11 Analysis MethodologySam Bowne
12 views59 slides
Breadcrumbs to Loaves: BSides Austin '17 by
Breadcrumbs to Loaves: BSides Austin '17Breadcrumbs to Loaves: BSides Austin '17
Breadcrumbs to Loaves: BSides Austin '17Brandon Arvanaghi
629 views53 slides

Similar to Ch 4: Footprinting and Social Engineering(20)

CNIT 123: Ch 4: Footprinting and Social Engineering by Sam Bowne
CNIT 123: Ch 4: Footprinting and Social EngineeringCNIT 123: Ch 4: Footprinting and Social Engineering
CNIT 123: Ch 4: Footprinting and Social Engineering
Sam Bowne777 views
OSINT for Attack and Defense by Andrew McNicol
OSINT for Attack and DefenseOSINT for Attack and Defense
OSINT for Attack and Defense
Andrew McNicol9.8K views
Ch04 Footprinting and Social Engineering by phanleson
Ch04 Footprinting and Social EngineeringCh04 Footprinting and Social Engineering
Ch04 Footprinting and Social Engineering
phanleson1.6K views
11 Analysis Methodology by Sam Bowne
11 Analysis Methodology11 Analysis Methodology
11 Analysis Methodology
Sam Bowne12 views
Breadcrumbs to Loaves: BSides Austin '17 by Brandon Arvanaghi
Breadcrumbs to Loaves: BSides Austin '17Breadcrumbs to Loaves: BSides Austin '17
Breadcrumbs to Loaves: BSides Austin '17
Brandon Arvanaghi629 views
12 Investigating Windows Systems (Part 2 of 3) by Sam Bowne
12 Investigating Windows Systems (Part 2 of 3)12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)
Sam Bowne30 views
Reconnaissance - For pentesting and user awareness by Leon Teale
Reconnaissance - For pentesting and user awarenessReconnaissance - For pentesting and user awareness
Reconnaissance - For pentesting and user awareness
Leon Teale1.6K views
CNIT 152: 3 Pre-Incident Preparation by Sam Bowne
CNIT 152: 3 Pre-Incident PreparationCNIT 152: 3 Pre-Incident Preparation
CNIT 152: 3 Pre-Incident Preparation
Sam Bowne140 views
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack... by EC-Council
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
EC-Council217 views
CNIT 152 12 Investigating Windows Systems (Part 2) by Sam Bowne
CNIT 152 12 Investigating Windows Systems (Part 2)CNIT 152 12 Investigating Windows Systems (Part 2)
CNIT 152 12 Investigating Windows Systems (Part 2)
Sam Bowne185 views
CNIT 121: 3 Pre-Incident Preparation by Sam Bowne
CNIT 121: 3 Pre-Incident PreparationCNIT 121: 3 Pre-Incident Preparation
CNIT 121: 3 Pre-Incident Preparation
Sam Bowne2K views
Distributed Sensor Data Contextualization for Threat Intelligence Analysis by Jason Trost
Distributed Sensor Data Contextualization for Threat Intelligence AnalysisDistributed Sensor Data Contextualization for Threat Intelligence Analysis
Distributed Sensor Data Contextualization for Threat Intelligence Analysis
Jason Trost1.4K views
CNIT 152: 12b Windows Registry by Sam Bowne
CNIT 152: 12b Windows RegistryCNIT 152: 12b Windows Registry
CNIT 152: 12b Windows Registry
Sam Bowne485 views
Hunting on the cheap by Anjum Ahuja
Hunting on the cheapHunting on the cheap
Hunting on the cheap
Anjum Ahuja329 views
Hunting on the Cheap by EndgameInc
Hunting on the CheapHunting on the Cheap
Hunting on the Cheap
EndgameInc1.6K views
Investigating Using the Dark Web by Case IQ
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark Web
Case IQ8K views

More from Sam Bowne

Cyberwar by
CyberwarCyberwar
CyberwarSam Bowne
14 views22 slides
3: DNS vulnerabilities by
3: DNS vulnerabilities 3: DNS vulnerabilities
3: DNS vulnerabilities Sam Bowne
40 views40 slides
8. Software Development Security by
8. Software Development Security8. Software Development Security
8. Software Development SecuritySam Bowne
22 views85 slides
4 Mapping the Application by
4 Mapping the Application4 Mapping the Application
4 Mapping the ApplicationSam Bowne
62 views88 slides
3. Attacking iOS Applications (Part 2) by
 3. Attacking iOS Applications (Part 2) 3. Attacking iOS Applications (Part 2)
3. Attacking iOS Applications (Part 2)Sam Bowne
33 views45 slides
12 Elliptic Curves by
12 Elliptic Curves12 Elliptic Curves
12 Elliptic CurvesSam Bowne
53 views50 slides

More from Sam Bowne(20)

3: DNS vulnerabilities by Sam Bowne
3: DNS vulnerabilities 3: DNS vulnerabilities
3: DNS vulnerabilities
Sam Bowne40 views
8. Software Development Security by Sam Bowne
8. Software Development Security8. Software Development Security
8. Software Development Security
Sam Bowne22 views
4 Mapping the Application by Sam Bowne
4 Mapping the Application4 Mapping the Application
4 Mapping the Application
Sam Bowne62 views
3. Attacking iOS Applications (Part 2) by Sam Bowne
 3. Attacking iOS Applications (Part 2) 3. Attacking iOS Applications (Part 2)
3. Attacking iOS Applications (Part 2)
Sam Bowne33 views
12 Elliptic Curves by Sam Bowne
12 Elliptic Curves12 Elliptic Curves
12 Elliptic Curves
Sam Bowne53 views
11. Diffie-Hellman by Sam Bowne
11. Diffie-Hellman11. Diffie-Hellman
11. Diffie-Hellman
Sam Bowne58 views
2a Analyzing iOS Apps Part 1 by Sam Bowne
2a Analyzing iOS Apps Part 12a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 1
Sam Bowne42 views
9 Writing Secure Android Applications by Sam Bowne
9 Writing Secure Android Applications9 Writing Secure Android Applications
9 Writing Secure Android Applications
Sam Bowne31 views
12 Investigating Windows Systems (Part 1 of 3 by Sam Bowne
12 Investigating Windows Systems (Part 1 of 312 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 3
Sam Bowne59 views
9. Hard Problems by Sam Bowne
9. Hard Problems9. Hard Problems
9. Hard Problems
Sam Bowne43 views
8 Android Implementation Issues (Part 1) by Sam Bowne
8 Android Implementation Issues (Part 1)8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)
Sam Bowne23 views
8. Authenticated Encryption by Sam Bowne
8. Authenticated Encryption8. Authenticated Encryption
8. Authenticated Encryption
Sam Bowne70 views
7. Attacking Android Applications (Part 2) by Sam Bowne
7. Attacking Android Applications (Part 2)7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)
Sam Bowne35 views
7. Attacking Android Applications (Part 1) by Sam Bowne
7. Attacking Android Applications (Part 1)7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)
Sam Bowne26 views
5. Stream Ciphers by Sam Bowne
5. Stream Ciphers5. Stream Ciphers
5. Stream Ciphers
Sam Bowne108 views
6 Scope & 7 Live Data Collection by Sam Bowne
6 Scope & 7 Live Data Collection6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection
Sam Bowne121 views
4. Block Ciphers by Sam Bowne
4. Block Ciphers 4. Block Ciphers
4. Block Ciphers
Sam Bowne86 views
6 Analyzing Android Applications (Part 2) by Sam Bowne
6 Analyzing Android Applications (Part 2)6 Analyzing Android Applications (Part 2)
6 Analyzing Android Applications (Part 2)
Sam Bowne21 views

Recently uploaded

UNIDAD 3 6º C.MEDIO.pptx by
UNIDAD 3 6º C.MEDIO.pptxUNIDAD 3 6º C.MEDIO.pptx
UNIDAD 3 6º C.MEDIO.pptxMarcosRodriguezUcedo
134 views32 slides
Volf work.pdf by
Volf work.pdfVolf work.pdf
Volf work.pdfMariaKenney3
54 views43 slides
AUDIENCE - BANDURA.pptx by
AUDIENCE - BANDURA.pptxAUDIENCE - BANDURA.pptx
AUDIENCE - BANDURA.pptxiammrhaywood
117 views44 slides
Computer Introduction-Lecture06 by
Computer Introduction-Lecture06Computer Introduction-Lecture06
Computer Introduction-Lecture06Dr. Mazin Mohamed alkathiri
105 views12 slides
CONTENTS.pptx by
CONTENTS.pptxCONTENTS.pptx
CONTENTS.pptxiguerendiain
62 views17 slides
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively by
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyPECB
623 views18 slides

Recently uploaded(20)

AUDIENCE - BANDURA.pptx by iammrhaywood
AUDIENCE - BANDURA.pptxAUDIENCE - BANDURA.pptx
AUDIENCE - BANDURA.pptx
iammrhaywood117 views
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively by PECB
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
PECB 623 views
JQUERY.pdf by ArthyR3
JQUERY.pdfJQUERY.pdf
JQUERY.pdf
ArthyR381 views
Class 9 lesson plans by TARIQ KHAN
Class 9 lesson plansClass 9 lesson plans
Class 9 lesson plans
TARIQ KHAN51 views
Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant... by Ms. Pooja Bhandare
Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant...Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant...
Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant...
Ms. Pooja Bhandare133 views
EILO EXCURSION PROGRAMME 2023 by info33492
EILO EXCURSION PROGRAMME 2023EILO EXCURSION PROGRAMME 2023
EILO EXCURSION PROGRAMME 2023
info33492109 views
Retail Store Scavenger Hunt.pptx by jmurphy154
Retail Store Scavenger Hunt.pptxRetail Store Scavenger Hunt.pptx
Retail Store Scavenger Hunt.pptx
jmurphy15446 views
Relationship of psychology with other subjects. by palswagata2003
Relationship of psychology with other subjects.Relationship of psychology with other subjects.
Relationship of psychology with other subjects.
palswagata200352 views
CUNY IT Picciano.pptx by apicciano
CUNY IT Picciano.pptxCUNY IT Picciano.pptx
CUNY IT Picciano.pptx
apicciano54 views

Ch 4: Footprinting and Social Engineering

  • 1. Hands-On Ethical Hacking and Network Defense Chapter 4 Footprinting and Social Engineering Updated 9-27-17
  • 2. Objectives ■ Use Web tools for footprinting ■ Conduct competitive intelligence ■ Describe DNS zone transfers ■ Identify the types of social engineering
  • 3. Using Web Tools for Footprinting ■ “Case the joint” • Look over the location • Find weakness in security systems • Types of locks, alarms ■ In computer jargon, this is called footprinting • Discover information about ■ The organization ■ Its network
  • 4. Table 4-1 Summary of Web tools
  • 5. Table 4-1 Summary of Web tools (cont’d.)
  • 6. Conducting Competitive Intelligence ■ Numerous resources to find information legally ■ Competitive Intelligence • Gathering information using technology ■ Identify methods others can use to find information about your organization ■ Limit amount of information company makes public
  • 7. Analyzing a Company’s Web Site ■ Web pages are an easy source of information ■ Many tools available ■ BurpSuite • Powerful proxy for all platforms (uses Java) • https://portswigger.net/burp/
  • 8. Burp Configuration ■ "Proxy" tab, "Intercept" sub-tab • Adjust to "Intercept is off" ■ "Proxy" tab, "Options" sub-tab • Start running on port 8080
  • 9. Proxy Settings in Firefox ■ At top right, click "3 bars" icon, then the Gear icon ■ In "Advanced", on the "Network" tab, click "Settings”
  • 10. Surf an Insecure Site like ietf.org ■ "HTTP History" tab shows each request and response
  • 11. Surf a Secure Site like samsclass.info ■ Browser detects Burp's MITM attack and warns you
  • 13. Installing the Burp Certificate ▪ On computer, in Firefox, using the proxy, visit http://burp ▪ Click the "CA Certificate" link ▪ Change file extension to .cer ▪ Drag file onto Genymotion phone ▪ On phone, settings, Security, "Install from SD card"
  • 14. Demo: Posting a Long Tweet
  • 15. Other Proxy Functions ▪ Intercept & Modify Requests ▪ Can exploit poorly-made shopping sites ▪ Spider ▪ Finds all the pages in a site ▪ Saves a local copy of them ▪ Scan for vulnerabilities ▪ Get authorization first
  • 16. Other Proxies ■ Zed Attack Proxy from OWASP • Can scan for vulnerabilities ■ Tamper Data • Firefox plug-in for easy interception and alteration of requests ■ Chrome Developer Tools • Click 3-bars, "More Tools", "Developer Tools" • Allows you to examine requests and responses
  • 17. Timeline ■ Shows requests & responses even for secure sites
  • 18. Using Other Footprinting Tools ■ Whois • Commonly used tool • Gathers IP address and domain information • Attackers can also use it ■ Host command • Can look up one IP address, or the whole DNS Zone file ■ All the servers in the domain
  • 19. ARIN Whois from Linux ■ host mit.edu ■ nc whois.arin.net ■ 18.7.22.69 ■ This shows registration information for the domain
  • 20. Sam Spade ■ GUI tool ■ Available for UNIX and Windows ■ Easy to use
  • 23. Using E-mail Addresses ■ E-mail addresses help you retrieve even more information than the previous commands ■ Find e-mail address format • Guess other employees’ e-mail accounts ■ Tool to find corporate employee information • Groups.google.com
  • 24. Using HTTP Basics ■ HTTP operates on port 80 ■ Use HTTP language to pull information from a Web server ■ Basic understanding of HTTP is beneficial for security testers ■ Return codes • Reveal information about server OS
  • 27. Using HTTP Basics (continued) ■ HTTP methods • GET / HTTP/1.1. is the most basic method • Can determine information about server OS from the server’s generated output
  • 30. Using the GET Method
  • 32. Other Methods of Gathering Information ■ Cookies ■ Web bugs
  • 33. Detecting Cookies and Web Bugs ■ Cookie • Text file generated by a Web server • Stored on a user’s browser • Information sent back to Web server when user returns • Used to customize Web pages • Some cookies store personal information ■ Security issue
  • 34. Viewing Cookies ■ In Firefox ■ Tools, Options ■ Privacy tab ■ Show Cookies
  • 35. Detecting Cookies and Web Bugs (continued) ■ Web bug • 1-pixel x 1-pixel image file (usually transparent) • Referenced in an <IMG> tag • Usually works with a cookie • Purpose similar to that of spyware and adware • Comes from third-party companies specializing in data collection
  • 36. Ghostery ■ Firefox & Chrome extension to reveal Web bugs
  • 37. Using Domain Name Service (DNS) Zone Transfers ■ DNS • Resolves host names to IP addresses • People prefer using URLs to IP addresses ■ Zone Transfer tools • Dig • Host
  • 38. Primary DNS Server ■ Determining company’s primary DNS server • Look for the Start of Authority (SOA) record • Shows zones or IP addresses
  • 39. Using dig to find the SOA ■ dig soa mit.edu ■ Shows three servers, with IP addresses ■ This is a start at mapping the MIT network
  • 40. Using (DNS) Zone Transfers ■ Zone Transfer • Enables you to see all hosts on a network • Gives you organization’s network diagram ■ MIT has protected their network – zone transfers no longer work ■ dig @BITSY.mit.edu mit.edu axfr ■ Command fails now
  • 41. Blocking Zone Transfers • See link Ch 4e
  • 42. Introduction to Social Engineering ■ Older than computers ■ Targets the human component of a network ■ Goals • Obtain confidential information (passwords) • Obtain personal information
  • 45. HB Gary Federal Hacked ■ Link Ch 4n
  • 47. Tactics • Persuasion • Intimidation • Coercion • Extortion/blackmailing
  • 48. Introduction to Social Engineering (continued) ■ The biggest security threat to networks ■ Most difficult to protect against ■ Main idea: • “Why to crack a password when you can simply ask for it?” • Users divulge their passwords to IT personnel
  • 49. Social Engineer Studies Human Behavior • Recognize personality traits • Understand how to read body language
  • 50. Introduction to Social Engineering (continued) ■ Techniques • Urgency • Quid pro quo • Status quo • Kindness • Position
  • 51. Preventing Social Engineering ■ Train user not to reveal any information to outsiders ■ Verify caller identity • Ask questions • Call back to confirm ■ Security drills
  • 55. DEF CON Social Engineering Contest ■ Link Ch 4k
  • 56. The Art of Shoulder Surfing ■ Shoulder surfer • Reads what users enter on keyboards ■ Logon names ■ Passwords ■ PINs
  • 57. Tools for Shoulder Surfing ■ Binoculars or telescopes or cameras in cell phones ■ Knowledge of key positions and typing techniques ■ Knowledge of popular letter substitutions • s equals $, a equals @
  • 58. The Art of Shoulder Surfing (continued) ■ Prevention • Avoid typing when someone is nearby • Avoid typing when someone nearby is talking on cell phone • Computer monitors should face away from door or cubicle entryway • Immediately change password if you suspect someone is observing you
  • 59. Dumpster Diving ■ Attacker finds information in victim’s trash • Discarded computer manuals ■ Notes or passwords written in them • Telephone directories • Calendars with schedules • Financial reports • Interoffice memos • Company policy • Utility bills • Resumes of employees
  • 60. The Art of Dumpster Diving (continued) ■ Prevention • Educate your users about dumpster diving • Proper trash disposal • Use “disk shredder” software to erase disks before discarding them ■ Software writes random bits ■ Done at least seven times • Discard computer manuals offsite • Shred documents before disposal
  • 61. Piggybacking ■ Trailing closely behind an employee cleared to enter restricted areas ■ How it works: • Watch authorized personnel enter an area • Quickly join them at security entrance • Exploit the desire of other to be polite and helpful • Attacker wears a fake badge or security card
  • 62. Piggybacking Prevention • Use turnstiles • Train personnel to notify the presence of strangers • Do not hold secured doors for anyone ■ Even for people you know • All employees must use secure cards
  • 63. Phishing ■ Deceptive emails or text messages ■ Can take money, passwords, or install malware on your computer