SlideShare a Scribd company logo
1 of 11
What is Footprinting?
• Footprinting is the first step of any attack on information systems in
which an attacker collects information about a target network to
identify various ways to intrude into the system
Footprinting Using Advanced Google Hacking Techniques
• Google hacking refers to the use of advanced Google search operators for
creating complex search queries to extract sensitive or hidden information that
helps attackers find vulnerable targets.
• [cache:] Displays the web pages stored in the Google cache
• [allintitle:] Restricts the results to those websites containing all the search
keywords in the title
• [link:] Lists web pages that have links to the specified web page
• [intitle:] Restricts the results to documents containing the search keyword in the
title
• [related:] Lists web pages that are similar to the specified web page
• [allinurl:] Restricts the results to those containing all the search
keywords in the URL
• [info:] Presents some information that Google has about a particular
web pag
• [inurl:] Restricts the results to documents containing the search
keyword in the URL
• [site:] Restricts the results to those websites in the given domai
• [location:] Finds information for a specific locatio
Note: Do not enter any spaces between the operator and the query.
 site: This operator restricts search results to the specified site or
domain. For example, the [games site: www.certifiedhacker.com]
query gives information on games from the certifiedhacker site.
 inurl: This operator restricts the results to only the pages containing
the specified word in the URL. For example, the [inurl: copy
site:www.google.com] query returns only Google pages in which the
URL has the word “copy.”
Sensitive information Google dork :
inurl:login.php
inurl:index.php?id=
Whois
• You can use the whois command in Linux to find out information
about a domain, such as the owner of the domain, the owner's
contact information, and the nameservers that the domain is using.
• Example : https://whois.domaintools.com/
Technology lookup
• Find out what websites are Built With
• Example : https://builtwith.com/
Banner Grabing
• Banner grabbing is a technique used to gain information about a
computer system on a network and the services running on its open
ports. Administrators can use this to take inventory of the systems
and services on their network.
• Banner Grabbing” is often termed as “Service Fingerprinting”.
Netcat is a network utility that will again help us to grab the FTP
banner of the remote host server.
nc 192.168.0.11 21
Whatweb
• “WhatWeb” recognizes websites, which helps us to grab the web-
applications banner by disclosing the server information with its
version, the IP address, the webpage Title and running operating
system.
Type the following command in order to capture the essentials.
• whatweb <website URL>
Shadon
Shodan is also a search engine, but one designed specifically for IoT
devices. It scours the invisible parts of the Internet most people won’t
ever see. Any connected device can show up in a search, including:
• Servers
• Printers
• Webcams
• Traffic lights
• Security cameras
• Control systems
SubDomain
• A subdomain is an additional part to your main domain name.
Subdomains are created to organize and navigate to different sections
of your website. You can create multiple subdomains or child domains
on your main domain.
• Example : https://github.com/Moham3dRiahi/Th3inspector
OSINT Framework
• OSINT framework focused on gathering information from free tools or
resources. The intention is to help people find free OSINT resources.
• Open Source INTelligence
• Example : https://osintframework.com/

More Related Content

Similar to Footprint basics

BSides SG Practical Red Teaming Workshop
BSides SG Practical Red Teaming WorkshopBSides SG Practical Red Teaming Workshop
BSides SG Practical Red Teaming Workshop
Ajay Choudhary
 

Similar to Footprint basics (20)

Cyber Security Project : Comprehensive Vulnerability Analysis Report.pptx
Cyber Security Project : Comprehensive Vulnerability Analysis Report.pptxCyber Security Project : Comprehensive Vulnerability Analysis Report.pptx
Cyber Security Project : Comprehensive Vulnerability Analysis Report.pptx
 
Eba ppt rajesh
Eba ppt rajeshEba ppt rajesh
Eba ppt rajesh
 
BITM3730 11-22.pptx
BITM3730 11-22.pptxBITM3730 11-22.pptx
BITM3730 11-22.pptx
 
Practical Malware Analysis Ch 14: Malware-Focused Network Signatures
Practical Malware Analysis Ch 14: Malware-Focused Network SignaturesPractical Malware Analysis Ch 14: Malware-Focused Network Signatures
Practical Malware Analysis Ch 14: Malware-Focused Network Signatures
 
Owasp modern information gathering
Owasp modern information gatheringOwasp modern information gathering
Owasp modern information gathering
 
Applciation footprinting, discovery and enumeration
Applciation footprinting, discovery and enumerationApplciation footprinting, discovery and enumeration
Applciation footprinting, discovery and enumeration
 
Gopher & Search Engines.pptx
Gopher & Search Engines.pptxGopher & Search Engines.pptx
Gopher & Search Engines.pptx
 
web development process WT
web development process WTweb development process WT
web development process WT
 
Wt unit 1 ppts web development process
Wt unit 1 ppts web development processWt unit 1 ppts web development process
Wt unit 1 ppts web development process
 
1. web technology basics
1. web technology basics1. web technology basics
1. web technology basics
 
Ferrante and Griffey "Federated Authentication_ Browser changes and what to e...
Ferrante and Griffey "Federated Authentication_ Browser changes and what to e...Ferrante and Griffey "Federated Authentication_ Browser changes and what to e...
Ferrante and Griffey "Federated Authentication_ Browser changes and what to e...
 
Door Of Internet
Door Of InternetDoor Of Internet
Door Of Internet
 
Subdomain Enumeration
Subdomain EnumerationSubdomain Enumeration
Subdomain Enumeration
 
BSides SG Practical Red Teaming Workshop
BSides SG Practical Red Teaming WorkshopBSides SG Practical Red Teaming Workshop
BSides SG Practical Red Teaming Workshop
 
Arcomem training Specifying Crawls Beginners
Arcomem training Specifying Crawls BeginnersArcomem training Specifying Crawls Beginners
Arcomem training Specifying Crawls Beginners
 
Training Webinar: Enterprise application performance with server push technol...
Training Webinar: Enterprise application performance with server push technol...Training Webinar: Enterprise application performance with server push technol...
Training Webinar: Enterprise application performance with server push technol...
 
Security tools
Security toolsSecurity tools
Security tools
 
Tool presentation - Recon-Lit
Tool presentation - Recon-LitTool presentation - Recon-Lit
Tool presentation - Recon-Lit
 
DEF CON 24 - workshop - Craig Young - brainwashing embedded systems
DEF CON 24 - workshop - Craig Young - brainwashing embedded systemsDEF CON 24 - workshop - Craig Young - brainwashing embedded systems
DEF CON 24 - workshop - Craig Young - brainwashing embedded systems
 
python project ppt.pptx
python project ppt.pptxpython project ppt.pptx
python project ppt.pptx
 

More from penetration Tester (20)

Maven
MavenMaven
Maven
 
Jenkins
JenkinsJenkins
Jenkins
 
Jenkins
JenkinsJenkins
Jenkins
 
Sonar qube
Sonar qubeSonar qube
Sonar qube
 
Owasp zap
Owasp zapOwasp zap
Owasp zap
 
Sonarlint
SonarlintSonarlint
Sonarlint
 
Shift left
Shift leftShift left
Shift left
 
Deployment Strategies
Deployment StrategiesDeployment Strategies
Deployment Strategies
 
DSOMM
DSOMMDSOMM
DSOMM
 
Devops
DevopsDevops
Devops
 
Shift left
Shift leftShift left
Shift left
 
Lfi
LfiLfi
Lfi
 
Directory traversal
Directory traversalDirectory traversal
Directory traversal
 
Burp documentation
Burp documentationBurp documentation
Burp documentation
 
7 layer OSI model
7 layer OSI model7 layer OSI model
7 layer OSI model
 
Virtual box
Virtual boxVirtual box
Virtual box
 
Tcp IP OSI
Tcp IP OSITcp IP OSI
Tcp IP OSI
 
Burp repeater
Burp repeaterBurp repeater
Burp repeater
 
Burp intruder
Burp intruderBurp intruder
Burp intruder
 
Hippa
Hippa Hippa
Hippa
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Recently uploaded (20)

ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 

Footprint basics

  • 1. What is Footprinting? • Footprinting is the first step of any attack on information systems in which an attacker collects information about a target network to identify various ways to intrude into the system
  • 2. Footprinting Using Advanced Google Hacking Techniques • Google hacking refers to the use of advanced Google search operators for creating complex search queries to extract sensitive or hidden information that helps attackers find vulnerable targets. • [cache:] Displays the web pages stored in the Google cache • [allintitle:] Restricts the results to those websites containing all the search keywords in the title • [link:] Lists web pages that have links to the specified web page • [intitle:] Restricts the results to documents containing the search keyword in the title • [related:] Lists web pages that are similar to the specified web page
  • 3. • [allinurl:] Restricts the results to those containing all the search keywords in the URL • [info:] Presents some information that Google has about a particular web pag • [inurl:] Restricts the results to documents containing the search keyword in the URL • [site:] Restricts the results to those websites in the given domai • [location:] Finds information for a specific locatio Note: Do not enter any spaces between the operator and the query.
  • 4.  site: This operator restricts search results to the specified site or domain. For example, the [games site: www.certifiedhacker.com] query gives information on games from the certifiedhacker site.  inurl: This operator restricts the results to only the pages containing the specified word in the URL. For example, the [inurl: copy site:www.google.com] query returns only Google pages in which the URL has the word “copy.” Sensitive information Google dork : inurl:login.php inurl:index.php?id=
  • 5. Whois • You can use the whois command in Linux to find out information about a domain, such as the owner of the domain, the owner's contact information, and the nameservers that the domain is using. • Example : https://whois.domaintools.com/
  • 6. Technology lookup • Find out what websites are Built With • Example : https://builtwith.com/
  • 7. Banner Grabing • Banner grabbing is a technique used to gain information about a computer system on a network and the services running on its open ports. Administrators can use this to take inventory of the systems and services on their network. • Banner Grabbing” is often termed as “Service Fingerprinting”. Netcat is a network utility that will again help us to grab the FTP banner of the remote host server. nc 192.168.0.11 21
  • 8. Whatweb • “WhatWeb” recognizes websites, which helps us to grab the web- applications banner by disclosing the server information with its version, the IP address, the webpage Title and running operating system. Type the following command in order to capture the essentials. • whatweb <website URL>
  • 9. Shadon Shodan is also a search engine, but one designed specifically for IoT devices. It scours the invisible parts of the Internet most people won’t ever see. Any connected device can show up in a search, including: • Servers • Printers • Webcams • Traffic lights • Security cameras • Control systems
  • 10. SubDomain • A subdomain is an additional part to your main domain name. Subdomains are created to organize and navigate to different sections of your website. You can create multiple subdomains or child domains on your main domain. • Example : https://github.com/Moham3dRiahi/Th3inspector
  • 11. OSINT Framework • OSINT framework focused on gathering information from free tools or resources. The intention is to help people find free OSINT resources. • Open Source INTelligence • Example : https://osintframework.com/