Footprinting, scoping and recon with DNS, Google Hacking and Metadata (Hacking Illustrated Series Info. Sec Tutorial Videos)Footprinting, scoping and recon with DNS, Google Hacking and Metadata. Please note, a better version is now. This class covers recon work, showing the student how a pen- tester/attacker. Covered topics will include DNS tools (like Whois. NSlookup/Dig, Nmap - s. L), Google Hacking using advanced search terms and Metadata. Recorded for the. Kentuckiana ISSA on March 2. Download slides in PPTX and PDF from. Download AVIs from: Part 0. Footprint Using Google Hacking Techniques; What a Hacker can do with Google Hacking? Google Advance Search Operators; Finding Resources Using Google Advance Operator;. Techniques used for Footprinting. DNS queries;. Search engines such as Google can also be used to gather. Information can also be gathered using the. Footprinting using advanced Google hacking techniques;. type of footprinting you want to perform there are many options here I select Footprint L3 and then click. Footprint Using Google Hacking Techniques; What a Hacker Can Do With Google Hacking? Google Advance Search Operators. Google Hacking Database (GHDB). Part 1. Part 2. Part 3. Part 4. Part 5. Part 6. Part 7. Part 8. Part 9. Part 1. 0Streaming Flash: (I had to upload it in 1. Let me know if it fails.) Below is a text version of the slides to improve search. Footprinting, scoping and recon with DNS, Google. Hacking and Metadata. ![]() Adrian Crenshaw. About Adrian*I run Irongeek. I have an interest in Info. Sec education*I don't know everything - I'm just a geek with time on my hands Class Structure*Mile wide, 2. Feel free to ask questions at any time*There will be many long breaks to play with the tools mentioned. So, what info is out there? Other names: *Scoping *Footprinting*Discovery*Recon*Cyberstalking.Subtopics*DNS, Whois and Domain Tools*Finding general Information about an organization via the web *Anti- social networks*Google Hacking*Metadata*Other odds and ends.Why? For Pen- testers and attackers: *Precursor to attack*Social Engineering*User names and passwords*Web vulnerabilities*Internal IT structure (software, servers, IP layout)*Spearphishing.For everyone else: *You want to keep attackers from finding this info and using this.Dropping Docs*All these techniques are legal*Sorry if I "drop someone's docs" other than my own*Please don't misuse this information. Visual Mp3 To Wav Converter Cracked . Backtrack 4 Prep. Enable the interface: ifconfig eth. Get an IP: dhclient. Start up the GUI/WIMP: startx. DNS, Whois and Domain Tools. Who- do the voodoo that you do so well. DNS*Glue of the Internet*Think of it as a phone book of sorts*Maps names to IPs, and IPs to names (and other odds and ends)*Organization information is also kept. Simple DNS Lookups*Host name to IP lookup: nslookup www. Reverse lookup: nslookup 2. DNS Record Types. Just a few record types cribbed from. List_of_DNS_record_types. AAAAAMXCNAMPTRAXFRGetting a list of host names*Zonetransfers *Nmap - s. L < some- IP- range> *Serversniff. DIGing for datadig irongeek. Zone Transfer: Give me all your records! Zone Transfer: NSLOOKUP (Windows version)C: \Documents and Settings\Adrian> nslookup. Default Server: resolver. Address: 2. 08. 6. Server: resolver. Address: 2. 08. 6. Non- authoritative answer: irongeek. Default Server: ns. Address: 6. 6. 3. Can't list domain irongeek. Query refused> exit. Zone Transfer: Can you DIG it? Zone Transfer: Others*Server. Sniff. http: //serversniff. Fiercehttp: //ha. GUI Dig for Windowshttp: //nscan. Nmap Demonmap - s. L < some- IP- range> Whois: Whooo, are you? Who- who- who- who.*Great for troubleshooting, bad for privacy*Who owns a domain name or IP*E- mail contacts*Physical addresses*Name server*IP ranges*Who is by proxy? Whois Demowhois irongeek. Whois Tools*nix Command line. Nirsoft's. http: //www.Pretty much any network tools collection.Windows Mobile. http: //www.Whois and domain tools sites*http: //www.Traceroute(ok, not really a DNS tool, but I was too lazy to make another. Vso Convert X To Dvd 4 And Serial Killers . Windows (ICMP): tracert irongeek. UDP by default, change with - I or - T): traceroute irongeek. Just for fun. http: //www. Finding general Information about an organization via the web So, you have a job posting for an Ethical Hacker huh? Sites about the organization *The organization's website (duh!)*Wayback Machinehttp: //www. Monster (and other job sites)http: //www. Zoominfohttp: //www. Google Groups (News groups, Google Groups and forums)http: //groups. Board readerhttp: //boardreader. Linked. Inhttp: //www.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
November 2017
Categories |