footprinting for security auditors
play

Footprinting for security auditors Jose Manuel Ortega @jmortegac - PowerPoint PPT Presentation

Security track Footprinting for security auditors Jose Manuel Ortega @jmortegac Footprinting for securty auditors Agenda Information gathering Footprinting tools Port scanning with nmap Nmap scripts Footprinting for securty


  1. Security track Footprinting for security auditors Jose Manuel Ortega @jmortegac Footprinting for securty auditors

  2. Agenda • Information gathering • Footprinting tools • Port scanning with nmap • Nmap scripts Footprinting for securty auditors

  3. Security auditing phases Footprint Analysis Who is DNS Lookup Search Engines Enumeration Scanning Analyze publicly Machines available Ports Exploitation Applications information. Set Buffer Overflows scope of attack Spoofing Check for Password and identify key vulnerabilities Rootkit targets. on each target Damage Attack targets resource “Owning” IP Theft, using library of Blackmail, Defacing, tools and Espionage, techniques Destruction, DoS Footprinting for securty auditors

  4. Security Track Information Gathering Footprinting for securty auditors

  5. Information gathering passive Footprinting (gather target information) ➔ names, addresses, system types, ... passive or Fingerprinting (identify topologies & systems) active ➔ network layout, operating systems, services active Sniffing (collect network traffic) ➔ addresses, names, information (passwords, ...) Enumeration (collect access information) ➔ list of user accounts, share names, … Scanning (detect systems and services) ➔ response from network stack, applications, ... Footprinting for securty auditors

  6. Footprinting • Identify locations, domain names, IP address ranges, e-mail addresses, dial-in phone numbers, systems used, administrator names, network topology. • Using public information. • Without network /physical connection to the target. Footprinting for securty auditors

  7. Security Track Tools Footprinting for securty auditors

  8. Kali Linux Footprinting for securty auditors

  9. Whois Online Tools • Get information about domains, IP address, DNS • Identify the domain names and associated networks related to a particular organization • https://www.whois.net/ • https://tools.whois.net/ • http://www.whois.com/whois • http://who.is • http://toolbar.netcraft.com/site_report • http://whois.domaintools.com/ Footprinting for securty auditors

  10. Netcraft • http://toolbar.netcraft.com/site_report/?url=fosdem.org Footprinting for securty auditors

  11. Whois Footprinting for securty auditors

  12. Whois command Footprinting for securty auditors

  13. Host command • Ge IPv4,v6,mail server Footprinting for securty auditors

  14. Network tools • http://network-tools.com/ Footprinting for securty auditors

  15. NETWORK Tools • https://www.dnssniffer.com/networktools Footprinting for securty auditors

  16. Footprinting for securty auditors

  17. Robtex • Provides graphical information from DNS and Whois • https://www.robtex.com/dns-lookup/fosdem.org Footprinting for securty auditors

  18. Robtex Footprinting for securty auditors

  19. Nslookup • Query DNS server in order to extract valuable information about the host machine. • Find names of machines through a domain/zone transfer • Nslookup -d → list all associated records for the domain Footprinting for securty auditors

  20. Dig /DNS Resolver Footprinting for securty auditors

  21. Dnsmap Footprinting for securty auditors

  22. Dnsenum Footprinting for securty auditors

  23. DnsRecon Footprinting for securty auditors

  24. Zone Transfer • How does one provide security against DNS Interrogation? • Restrict zone transfers to authorized servers. • Set your firewall or router to deny all unauthorized inbound connections to TCP port 53 • Best practice to restrict Zone transfers is review file configuration /etc/bind/named.conf.local Footprinting for securty auditors

  25. Subdomains • https://api.hackertarget.com/hostsearch/?q=fosdem.org Footprinting for securty auditors

  26. The harvester • Catalogue email address and subdomains from a specific domain. • It works with all the major search engines including Bing and Google. • The objective is to gather emails, subdomains, hosts, employee names, open ports and banners from different public sources like search engines, PGP key servers and SHODAN computer database. Footprinting for securty auditors

  27. The harvester Footprinting for securty auditors

  28. The harvester Footprinting for securty auditors

  29. Maltego Footprinting for securty auditors

  30. Maltego ∙ Company Stalker (this gathers email information) ∙ Footprint L1 (basic information gathering) ∙ Footprint L2 (moderate amount of information gathering) ∙ Footprint L3 (intense and the most complete information gathering) Footprinting for securty auditors

  31. Maltego Footprinting for securty auditors

  32. Shodan Footprinting for securty auditors

  33. Censys.io Footprinting for securty auditors

  34. Mr looquer Footprinting for securty auditors

  35. Web robots •https://wordpress.com/robots.txt •https://wordpress.com/sitemap.xml Footprinting for securty auditors

  36. Web Archive Footprinting for securty auditors

  37. Spider foot Footprinting for securty auditors

  38. Spider foot Footprinting for securty auditors

  39. Scanning tools • Active footprinting • Number and type of opened ports • Type of services running in the servers • Vulnerabilities of the services and software • Nmap is a great tool for discovering Open ports, protocol numbers, OS details, firewall details, etc. Footprinting for securty auditors

  40. Security Track NMAP Footprinting for securty auditors

  41. Nmap Port Scanner • Unix-based port scanner • Support for different scanning techniques • Detects operating system of remote hosts • Many configuration options - timing - scanned port range - scan method • Various front ends for easier handling Footprinting for securty auditors

  42. Zenmap Port Scanner Footprinting for securty auditors

  43. Zenmap Port Scanner Footprinting for securty auditors

  44. Sparta Footprinting for securty auditors

  45. Nmap whois Footprinting for securty auditors

  46. Guessing the Operating System • We can use the -- osscan-guess option to force Nmap into discovering the OS. Footprinting for securty auditors

  47. Banner Grabbing nmap -p80 -sV -sT fosdem.org Footprinting for securty auditors

  48. Nmap Script Engine • Simple scripts to automate a wide variety of networking tasks • Are written in Lua programming language. • Network discovery • Vulnerability detection • Backdoor detection • Vulnerability exploitation Footprinting for securty auditors

  49. Nmap Script Engine usr/local/share/nmap/scripts Footprinting for securty auditors

  50. Nmap Script Engine • https://github.com/cldrn/nmap-nse-scripts/tree/master/ scripts Footprinting for securty auditors

  51. Banner grabbing with nmap script nmap --script banner fosdem.org Footprinting for securty auditors

  52. http-enum script nmap -v --script http-enum.nse fosdem.org Footprinting for securty auditors

  53. ↘ mysql-databases nmap -v -d -p3306 --script mysql-databases.nse --script-args='mysqluser=root' 192.168.100.8 Footprinting for securty auditors

  54. ↘ mysql-databases Footprinting for securty auditors

  55. Find vulnerabilities with nmap • XSS / SQL Injection ↘ nmap -p80 –script http-unsafe-output-escaping <target> ↘ http://svn.dd-wrt.com/browser/src/router/nmap/scripts/http-un safe-output-escaping.nse?rev=28293 ↘ https://nmap.org/nsedoc/scripts/http-unsafe-output-escaping.ht ml Footprinting for securty auditors

  56. Security Track Vulnerability Scanner Footprinting for securty auditors

  57. Nessus Vulnerability Scanner Footprinting for securty auditors

  58. Arachni Vulnerability Scanner Footprinting for securty auditors

  59. Links & References • http://www.0daysecurity.com/penetration-testing/net work-footprinting.html • http://nmap.org/nsedoc/ • https://secwiki.org/w/Nmap/External_Script_Library • https://nmap.org/book/man-os-detection.html • https://hackertarget.com/7-nmap-nse-scripts-recon/ Footprinting for securty auditors

  60. Books Footprinting for securty auditors

  61. Security track Thank you! Jose Manuel Ortega @jmortegac Footprinting for securty auditors

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend