Introduction To Ethical Hacking and Intrusion Prevention - 3
Introduction To Ethical Hacking and Intrusion Prevention - 3
Introduction To Ethical Hacking and Intrusion Prevention - 3
Per-attack phase
Accumulating data regarding a target’s environment and architecture
Purpose is to learn as much as possible about a system, its remote access points, its ports
and services, and any specific aspects of its security
Google search engine can be creatively to perform information gathering
Google Hacking
Network Mapping Tools
Seven Steps of Information Gathering
A process of locating all the DNS servers and their corresponding records for an
organization
Internal and External DNS Servers can yield
Usernames
Computer names
IP addresses of potential target systems
Nslookup, the American Registry of Internet Numbers (ARIN) and Whois can be used to
gain information that can be sued to perform DNS enumeration
Whois and ARIN Lookups
Human-based
Calling the help desk and trying to find out a password
Computer-based
Sending a user an email and asking them to re-enter a password, known as phishing
Human-Based Social Engineering
E-mail attachments
Fake websites
Popup windows
Insider Attacks
nslookup
whois
Google hacking (be careful)
tracert/traceroute