4.1 - Reconnaissance Overview

 4.1 - Reconnaissance overview 

 

Key Terms: 

    • Reconnaissance – A systematic attempt to locate, gather, record and identify information. 
    • Passive information gathering – A method of indirectly gathering information about a target. 
    • Active information gathering – A method of directly gathering information about a target. Usually this is a lot more blatant. 

 

Internet Research 

Sometimes, valuable information is not hidden. Lots of information can be accessed using the internet such as websites, social media, discussion groups, financial reports, and news articles. 

 

Social Engineering 

Various means of social engineering can identify information about the target. Humans are always the weakest part of any system so targeting employees can often be a very good way of getting information. Depending on the technique the attacker uses, it can be overlooked easily making the hacker undetected. 

 

Information Gathering 

Attackers are looking for: 

    • Contact names 
    • Phone numbers 
    • Email addresses 
    • Security information 
    • Technical infrastructure 

 

Footprinting 

A footprint is a piece of information that is accidentally shared publicly. This information can be found through websites and emails and recorded for later use. An attacker could even create a network map based off this information without even connecting to the business network. This is because DNS provides a convenient network addressing method as an IP can direct you to a network access point like an email or web server. 

 

Tools 

Here is a list of useful tools that a hacker may use. Please note that some of these tools are malicious and should only be used in a professional or educational environment only. 

    • Google Earth – A satellite imagery website useful for physical reconnaissance. 
    • Google Maps – A web mapping service that can provide a view of housing and other infrastructure around the target. 
    • Webcams – Online streaming cameras that provide free-to-view video of an area. 
    • Echosec – A tool that can be used to pull information from social media posts that were made using locational services. You can select a location and view all posts made in that one area. 
    • Maltego – An open-source forensic analysis tool used to pull information from social media posts and find links between companies, people, emails, and other information.  
    • Wayback Machine – An archive of old site snapshots. It can sometimes contain information that the target thought they had completely removed from the internet. 
    • Whois – A utility to gain information about a target network. It can gather information about a network such as ownership, IP addresses, domain names, locations, server types, and dates. Whois is a default KALI library with the syntax (Whois domain_name) 
    • Nslookup – A utility used to query DNS servers to obtain information about the host network, including DNS records and host names. 
    • ARIN – A website that provides information about a network’s name, range, organisation dates, and server details. 

 

Google Dorking 

A set of useful parameters inputted into google: 

    • info:website – Provides information about a website. 
    • link:website – Lists web pages that contains links to websites. 
    • related:website – Displays websites similar to the one listed. 
    • index of /keyword - Displays websites where the directory browsing has been enabled. 
    • intitle:keyword – Shows results in pages that contain the keyword in the title. 
    • allinurl:keywords – Shows results in pages that contain all of the listed keywords. 
    • site:.extension filetype:file_extensionShows results of files listed on a URL extension. Files extensions: (docx – Word document, xlsx – Excel document, mdb – Access databases, pptx – Powerpoints, pdf – PDF documents) 

Here is a website containing all search exploits: https://www.exploit-db.com/google-hacking-database 

 

TheHarvester 

theHarvester is a preinstalled KALI package capable of pulling information from a domain. 


 


Here are some useful commands: 

    • theHarvester –h (help page) 
    • theHarvester –d domain –l limit –b source (scan a domain from a source and limit results) 

Nmap 

Nmap is a preinstalled KALI package capable of pulling information about a network. Here are some useful commands: 

    • ping url (ping a URL to check response) 
    • traceroute url (find a route to the given URL) 
    • nslookup url (find the server name for a domain) 
    • whois url (scan a URL for information) 
    • nc –v url port (make a connection on an open port) 
    • nmap –sS url (scan a url for open ports) 
    • nmap –sn ip (perform a ping sweep on an IP) 

Comments

Popular posts from this blog

OSA Assignment 1 - Task 3 GUIDE

OSA Assignment 1 - Task 1 GUIDE

OSA Summer 2023 Mock - Task 1, Assignment 1