It is the process to define the profile of the target organization as the result of footprinting.
the scope of the assessment identifies the systems, network, policies and procedures, human resources, and any other component of the system that requires security evaluation.
Passive Footprinting: Involves gathering information without direct interaction. Useful when you require not to be detected by the target.
Active Footprinting: Involves gathering information with direct interaction.
Techniques:
- Footprinting through search engines
- Google hacking techniques
- Video search engines
- FTP search engines
- IoT search engines
- Footprinting through web services
- Find domains and sub-domains using Netcraft
- Personal information using PeekYou online people search service
- Email list using theHarvester
- Using deep and dark web searching
- Determine target OS through passive footprinting
- Footprinting through social networking sites
- Employee information with LinkedIn using theHarvester
- Information from various social networking sites using Sherlock
- Using Followerwonk
- Website footprinting
- Ping command line utility
- Central Ops
- Using Web Data Extractor
- Mirror the target website using HTTrack Web Site Copier
- CeWL
- Email footprinting
- Tracing emails using eMailTrackerPro
- Whois footprinting
- Whois lookup using DomainTools
- DNS footprinting
- Gather DNS information using nslookup command line utility and online tool
- Perform reverse DNS lookup using reverse IP domain check and DNSRecon
- Network footprinting
- Locate the network range
- Perform network tracerouting in Windows and Linux Machines
- Footprinting using various footprinting tools
- Recon-ng
- Maltego
- OSRFramework
- BillCipher
- OSINT Framework
Host Discovery – Footprinting through search engines
Advanced Google Hacking Techniques
Supongamos que temenos como target www.webtargetexample.com
cache:www. webtargetexample.com
allinurl: google career
inurl: copy site: www. webtargetexample.com
intitle:password site: www. webtargetexample.com
allintitle: detect malware
Anti-virus inanchor: webtargetexample
allinanchor: best cloud service provider
link:www. webtargetexample.com
related:www. webtargetexample.com
info: webtargetexample.com
location: webtargetexample
for video search you can use: https://citizenevidence.amnestyusa.org/
It can help to extract Meta Data page appears, in the Enter YouTube URL search field. You can use also video analysis tools such as EZGif (https://ezgif.com), VideoReverser.com, etc.; and reverse image search tools such as TinEye Reverse Image Search (https://tineye.com), Yahoo Image Search (https://images.search.yahoo.com)
FTP Search Engines
File Transfer Protocol (FTP) search engines are used to search for files located on the FTP servers.
Launch https://www.searchftps.net/
Also you can use:
IoT Search Engines
we will search for information about any vulnerable IoT device in the target organization using the Shodan IoT search engine. https://www.shodan.io/. You can also use (https://censys.io), (https://www.thingful.net), which are IoT search engines, to gather information such as manufacturer details, geographical location, IP address, hostname, open ports, etc.
Footprinting Through Web Services
Domains and Sub-domains using Netcraft
Use the website:
Also you can use the Sublist3r tool in a kali machine. Instruction in this website: https://github.com/aboul3la/Sublist3r
Gather an Email List
Install theHarvester in your Parrot machine and type theHarvester -d websitetarget.com -l 200 -b
Deep and Dark Web Searching
- Use the Tor Browser. With this browser you will find the more relevant links than chrome. You can also use tools such as ExoneraTor (https://metrics.torproject.org), OnionLand Search engine (https://onionlandsearchengine.com), etc. to perform deep and dark web browsing.
Also check onion sites for valuable information:
- The Hidden Wiki is an onion site that works as a Wikipedia service of hidden websites. (http://zqktlwi4fecvo6ri.onion/wiki/index.php/Main_Page)
- FakeID is an onion site for creating fake passports (http://fakeidskhfik46ux.onion/)
- The Paypal Cent is an onion site that sells PayPal accounts with good balances (http://nare7pqnmnojs2pg.onion/)
Determine Target OS
Footprinting
Information from LinkedIn
- Type this command in the Parrot terminal: theHarvester -d eccouncil -l 200 -b linkedin
- Install the command Sherlock and type:
cd sherlock/sherlock/
python3 sherlock.py satya Nadella
Additionally you can use this website: https://followerwonk.com/analyze. You can also use Hootsuite https://hootsuite.com, Sysomos https://www.sysomos.com.
Website Footprinting
The ping command sends an ICMP echo request to the target host and waits for an ICMP response.
ping measures the time from transmission to reception, known as round-trip time, and records any loss of packets.
In a windows machine type: ping www.websitetarget.com
try different values until you find the maximum frame size
ping www.certifiedhacker.com -f -l 1300