Footprinting - Paiet/SEC-335 GitHub Wiki
Objectives:
- Identify Live Hosts on a Network
- Perform Discovery Scans
- Perform Port Scanning
- Perform Stealth Scans
- Perform Packet Crafting
- Perform Fingerprinting
- Perform Service Probing
- Disable Ping Sweep
- Use Timing Templates
- Work with Nmap Output Parameters, such as oA, oN, oG, and oX
There are different ways to enumerate a Windows host. Using enumeration, you can discover information, such as:
- OS version
- Users
- Services
- Groups
- Privileges
- Shares
- Configuration Settings
A Windows host can be enumerated using different methods. For example, you can enumerate a Windows host using:
-
Built-in commands
-
Nmap
-
Rpcclient
-
Metasploit Framework
-
You can use Nmap to scan networks:
- Scan for a single IP: nmap 192.168.0.1
- Scan for a host by using its name: nmap host1.sec335.local
- Scan an entire subnet: nmap sec335.local/24, nmap 192.168.0.0/24, nmap 192.168.0.*
- Scan for a range of IP addresses: nmap 192.168.0.1-10
- Scan for a range and a system outside the range: nmap 192.168.0.1, 1.10
-
Nmap Paramaters:
-
What is Footprinting?
- Passive
- No direct interaction with the target
- Kind of like 'eavesdropping' on a conversation
- Looking for freely available/public info
- May get lucky and find unsecured sensitive info
- Difficult/impossible to detect
- No direct interaction with the target
- Active
- Direct interaction with target
- Interrogation vs. eavesdropping
- Detection possible
- Direct interaction with target
- Passive
-
What kinds of information are attackers looking for?
- System Info
- OS type
- Services
- Usernames/Passwords
- Network Info
- DNS
- Domain/Sub-domains
- Firewall rules
- Organizational Info
- Contact info
- Employee info
- Location info
- System Info
-
How does this information help attackers?
- May reveal security controls
- Helps them focus on live targets
- Vulnerability identification
-
So, does Footprinting directly lead to target compromise?
- Usually not directly, but it is a crucial step towards those ends
- It supports compromise attacks like
- Social Engineering
- Sensitive Data Exposure
- System/Network Hacking ...