Search This Blog

Friday, July 1, 2011

Unearthing Initial Information-Footprinting

Open source footprinting
Perform whois request, searching thorough DNS tables are other forms of open source footprinting. Most of the information is fairly easy to get and within legal limits. One easy way to check for sensitive information is to check the HTML source code of the website to look for links comments, Meta tags etc.
The attack can choose to source information from:
  • A web page (save it offline, e.g. using offline browser such as Teleport pro athttp://www.tenmax.com/teleprot/pro/home.htm )
  • Yahoo or other directories (Tifny is a comprehensive search tool for USENET newsgrops)
  • Multiple search engines (All-in-oneDogpile), groups.google.com is a great resource for searching large number of news groups archives without having to use a tool
  • Using advanced search (e.g. AltaVista where revers links can be unearthed to vulnerabile sites)
  • Search on publicly trade companies (e.g. EDGAR)
  • Dumpster diving (to retrieve document that is carelessly disposed)
  • Physical access (False ID, temporary/contract employee etc)
Apart from surfing the site, the attacker can use whois or nslookup to collect information. http://www.allwhois.com/ is considered a comprehensive whois interface.
There are tools available to aid whois:
Reader is encouraged to read RFC 10341035 and standardsstd/std13 - Internet standard for Domain Name.

Add To Google BookmarksStumble ThisFav This With TechnoratiAdd To Del.icio.usDigg ThisAdd To RedditTwit ThisAdd To FacebookAdd To Yahoo

0 comments:

Post a Comment