340 likes | 685 Views
Information Gathering. 2012 BackTrack Workshop Upstate ISSA Chapter. Agenda. Intelligence Gathering Publicly Available Information Google Hacking DNS Enumeration Maltego. Intelligence Gathering. Special Forces conduct successful operations based on intelligence
E N D
Information Gathering 2012 BackTrack Workshop Upstate ISSA Chapter
Agenda • Intelligence Gathering • Publicly Available Information • Google Hacking • DNS Enumeration • Maltego
Intelligence Gathering • Special Forces conduct successful operations based on intelligence • The more information, the more successful the operation • Most of pentesting engagement dedicated to reporting and information gathering
Publicly Available Information • Website Analysis • Whois • Netcraft • Mapping Physical Locations • Social Media • SHODAN • Maltego
Whois whois –h org.whois-servers.net issa.org
Google Hacking • goofile • goohost • gooscan • metagoofil • theHarvester
theHarvester ./theHarvester.py –d issa.org –l 500 –b google
DNS Enumeration • DNS Record Types • Zone Transfers • dnsenum • fierce
DNS Record Types • SOA = Start of Authority • NS = Name Server • A = Address (Host) • CNAME = Canonical Name (Alias) • MX = Mail Exchanger • SRV = Service Locator • TXT = Text Data
Zone Transfer (IP Information) Ethernet adapter Wireless Network Connection: Connection-specific DNS Suffix . : test.com Description . . . . . . . . . . . : Intel(R) WiFi Link 1000 BGN Physical Address. . . . . . . . . : AA-BB-CC-DD-EE-FF Dhcp Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes IP Address. . . . . . . . . . . . : 192.168.10.28 Subnet Mask . . . . . . . . . . . : 255.255.255.0 Default Gateway . . . . . . . . . : 192.168.10.1 DHCP Server . . . . . . . . . . . : 192.168.10.150 DNS Servers . . . . . . . . . . . : 192.168.10.150 192.168.10.151 Primary WINS Server . . . . . . . : 192.168.10.150 Secondary WINS Server . . . . . . : 192.168.10.151 Lease Obtained. . . . . . . . . . : Monday, January 03, 2012 7:46:22 PM Lease Expires . . . . . . . . . . : Tuesday, January 04, 2012 3:46:22 AM
Zone Transfer (Conduct AXFR) D:\>nslookup Default Server: ns1.test.com Address: 192.168.10.150 > server 192.168.10.151 Default Server: ns2.test.com Address: 192.168.10.151 > set type=any > ls -d fluor.com
Zone Transfer (Results) Default Server: ns1.test.com Address: 192.168.10.10 > > [ns1.test.com] test.com. NS ns1.test.com test.com. NS ns2.test.com ns1 A 192.168.10.10 ns2 A 192.168.10.11 payroll A 192.168.10.199 server1 A 192.168.10.215 192.168.1.1 TXT "Core Switch GigabitEthernet 0/0" dnsserver CNAME ns1.test.com _kerberos._tcp.WashingtonDC._sites.dc._msdcs SRV priority=0, weight=100, port=88, server1.test.com _ldap._tcp.WashingtonDC._sites.dc._msdcs SRV priority=0, weight=100, port=389, server1.test.com
Bookmarks • johnny.ihackstuff.com • securitytube.net • paterva.com