2.1 Footprinting Concepts

00:07:41
https://www.youtube.com/watch?v=ip361MMCQdM

概要

TLDRFootprinting is a critical step in the hacking process, focused on gathering information about a target without direct interaction. It involves both passive and active methods to collect data on the target's security posture, vulnerabilities, and operational details. Passive footprinting uses publicly available information to build a profile of the target without engaging them, while active footprinting involves benign interactions to gather more insights. The overall goal is to compile actionable intelligence that can aid in future hacking attempts, with a focus on understanding potential weaknesses and developing effective strategies for compromise.

収穫

  • 🕵️‍♂️ Footprinting is the first step in hacking, focusing on information gathering.
  • 🌐 Passive footprinting uses public sources without engaging the target directly.
  • 👥 Active footprinting involves benign interactions, observing as a normal user.
  • 📊 The goal is to understand the target's security posture and potential vulnerabilities.
  • 💻 Information gathered includes company details, email addresses, and IP addresses.
  • 🔍 Tools and techniques for footprinting include search engines, social media, and public events.
  • 📉 Not all information may seem useful initially, but it can become relevant later.
  • 🔗 Always analyze collected data for potential connections and trends.

タイムライン

  • 00:00:00 - 00:07:41

    The initial phase of hacking, known as footprinting, involves gathering information about a target without directly engaging them. This reconnaissance stage aims to collect traces, tracks, and other data related to the target's security posture, potential vulnerabilities, and network layout to understand how accessible they may be to attacks. The information gathered includes company profiles, contact details, online presence, financial data, and any leaked documents that can provide insight into their systems and defenses. Sources for footprinting encompass various public platforms, such as the target's website, social media, press releases, and open-source intelligence tools. There are two main types of footprinting: passive and active. Passive footprinting involves discreetly gathering publicly available information, while active footprinting engages in innocuous actions that won't raise suspicion, such as visiting websites, interacting at events, or querying DNS servers. The end goal is to analyze the collected data to inform future actions and strategize potential attacks, securing useful information for later stages.

マインドマップ

ビデオQ&A

  • What is footprinting in hacking?

    Footprinting is the process of gathering information about a target system or organization in a subtle way, to understand their security posture and potential vulnerabilities.

  • What are the two types of footprinting?

    The two types are passive footprinting, which involves collecting information from public sources without engaging the target, and active footprinting, which involves interacting with the target in a benign manner.

  • What kind of information can be gathered during footprinting?

    Information can include company details, mission statements, services, employee roles, email addresses, IP addresses, network configurations, and online presence.

  • How can I gather information passively?

    You can gather information passively through internet searches, social media, press releases, job boards, and specialized open-source intelligence tools.

  • What does active footprinting involve?

    Active footprinting may involve visiting the target's website, engaging with them at events, querying their DNS servers, or collecting metadata from published documents.

  • Why is it important to analyze gathered information?

    Analyzing gathered information helps identify useful data for future moves, recognizing potential connections or trends that could inform hacking strategies.

ビデオをもっと見る

AIを活用したYouTubeの無料動画要約に即アクセス!
字幕
en
オートスクロール:
  • 00:00:01
    as we begin hacking we start by
  • 00:00:03
    gathering information about our Target
  • 00:00:07
    and we want to be subtle about it that's
  • 00:00:10
    where footprinting comes in footprinting
  • 00:00:14
    is our first step in reconnaissance
  • 00:00:17
    we're looking on the internet we're
  • 00:00:19
    looking for traces and tracks of the
  • 00:00:22
    target we're looking around we're not
  • 00:00:25
    engaging them but we're collecting as
  • 00:00:28
    much information about all the stuff
  • 00:00:30
    they leave the footprints they leave
  • 00:00:32
    behind right we're trying to gain
  • 00:00:34
    knowledge of the target their security
  • 00:00:37
    posture what do they have who do they
  • 00:00:39
    have what are physical or logical
  • 00:00:42
    vulnerabilities possibly let's get a
  • 00:00:45
    high level map of their Network let's
  • 00:00:48
    understand the human targets we might
  • 00:00:50
    engage or the potential servers and
  • 00:00:53
    systems we might try to
  • 00:00:54
    attack any information that might not
  • 00:00:58
    seem immediately useful
  • 00:01:00
    may still be relevant
  • 00:01:02
    later the types of things we're going to
  • 00:01:04
    gather will include anything that would
  • 00:01:07
    help us gain access to the Target
  • 00:01:09
    Network General company information
  • 00:01:12
    their mission their services their
  • 00:01:14
    products their activities where they are
  • 00:01:16
    their contacts email addresses contact
  • 00:01:19
    information job roles their internet
  • 00:01:22
    presence what domains do they have what
  • 00:01:25
    websites do they have what online
  • 00:01:27
    services do they offer any IP addresses
  • 00:01:30
    Network reachability any documents that
  • 00:01:33
    might have leaked out onto the internet
  • 00:01:35
    any login information they overall
  • 00:01:39
    security posture so we get a sense of
  • 00:01:41
    how difficult they'll be to hack what
  • 00:01:43
    technologies do they use and also where
  • 00:01:48
    are they in the market market
  • 00:01:50
    information their profile their assets
  • 00:01:53
    their financial information they're
  • 00:01:56
    competitors you can get footprinting
  • 00:01:58
    from all over the place but mostly it's
  • 00:02:01
    somewhere on the internet the company
  • 00:02:03
    website who is search engines job boards
  • 00:02:07
    people searches social networking social
  • 00:02:10
    media press releases that they put out
  • 00:02:13
    and specialized open-source information
  • 00:02:17
    tools osen
  • 00:02:20
    tools passive footprinting is the
  • 00:02:22
    quietest we're going to look through
  • 00:02:25
    publicly available information we'll use
  • 00:02:28
    opsource intelligence
  • 00:02:30
    we're not going to directly Engage The
  • 00:02:33
    Target we're just going to pick up on
  • 00:02:35
    all their footprints that they left
  • 00:02:38
    behind active footprinting well this is
  • 00:02:41
    where we're going to engage the target
  • 00:02:43
    but we're going to do it in just normal
  • 00:02:47
    innocent innocuous ways we're trying not
  • 00:02:50
    to arouse any suspicion so active
  • 00:02:52
    footprinting is not going to be a port
  • 00:02:54
    scan it's going to be more like visiting
  • 00:02:57
    the website like a normal visitor a
  • 00:02:59
    normal user engaging with people at a
  • 00:03:02
    trade show or a conference or some kind
  • 00:03:05
    of event or presentation stuff that
  • 00:03:08
    would not arouse their suspicion stuff
  • 00:03:10
    that the general public would just
  • 00:03:12
    normally do we would interact with them
  • 00:03:16
    we would go to their public servers we
  • 00:03:18
    would query their DNS server like we're
  • 00:03:20
    doing normal business we might do a
  • 00:03:23
    trace route to their Network we might
  • 00:03:26
    mirror or crawl their website we would
  • 00:03:30
    extract published information published
  • 00:03:33
    document metadata and more on that soon
  • 00:03:36
    we'll do a little bit of social
  • 00:03:38
    engineering collect business cards chat
  • 00:03:41
    people up at public events trade shows
  • 00:03:44
    but all of this would be normal stuff it
  • 00:03:47
    is not designed to arouse any suspicion
  • 00:03:51
    at
  • 00:03:52
    all the footprinting process starts with
  • 00:03:55
    if they have a website let's visit it we
  • 00:03:58
    can use search engine to get information
  • 00:04:01
    about them including News and Press
  • 00:04:04
    releases we could use cached information
  • 00:04:07
    from search engines or go to places like
  • 00:04:10
    archive.org to see information that they
  • 00:04:13
    took down but someone got a copy of it
  • 00:04:17
    we could use ENT tools to automate our
  • 00:04:20
    information gathering get hidden
  • 00:04:23
    information we can do a lot of
  • 00:04:25
    footprinting through social engineering
  • 00:04:27
    but remember this is casual context
  • 00:04:30
    we want to know names job titles
  • 00:04:33
    personal
  • 00:04:34
    information email addresses contact info
  • 00:04:37
    stuff that we can take advantage of
  • 00:04:39
    later we're trying to appear like it's
  • 00:04:43
    normal business we want to go unnown
  • 00:04:46
    look like potential customers techniques
  • 00:04:49
    just interaction at a trade show at some
  • 00:04:52
    kind of public event or maybe at a
  • 00:04:55
    coffee shop will will Eaves drop or
  • 00:04:57
    shoulder surf or dster dive or
  • 00:05:01
    impersonate people on network
  • 00:05:05
    sites we could also sign up for alerts
  • 00:05:08
    and update monitoring you can monitor a
  • 00:05:11
    website for when they change their
  • 00:05:13
    content we would set alerts to notify us
  • 00:05:17
    when that change happens and we get the
  • 00:05:19
    alerts via email or SMS you would have
  • 00:05:23
    to register with the website to do this
  • 00:05:25
    so you get Google Alerts Yahoo alerts
  • 00:05:27
    Twitter alerts Giga alerts it depends
  • 00:05:30
    upon the
  • 00:05:32
    service some ENT tools will offer
  • 00:05:35
    monitoring and
  • 00:05:37
    alerts and finally we have this whole
  • 00:05:40
    mass of stuff what are we going to do
  • 00:05:43
    with it how will we use the results that
  • 00:05:46
    we have
  • 00:05:48
    gathered you need to analyze all this
  • 00:05:50
    stuff what would be useful for your next
  • 00:05:53
    moves and remember what might not seem
  • 00:05:55
    useful now might become really useful
  • 00:05:59
    later as you start to see connections
  • 00:06:02
    and Trends and you start to group things
  • 00:06:05
    up so small bits of data don't discard
  • 00:06:08
    them just keep them handy but look for
  • 00:06:11
    your next steps get a sense of their
  • 00:06:14
    overall security posture how much do
  • 00:06:17
    they care about security how easy might
  • 00:06:19
    it be to break into them or to social
  • 00:06:22
    engineer them we're going to look for
  • 00:06:25
    information that we can use we're going
  • 00:06:27
    to get a sense of do they have IP
  • 00:06:30
    addresses that we could scan do they
  • 00:06:31
    have servers or services that we could
  • 00:06:33
    scan what do they have on the internet
  • 00:06:36
    what maybe iot devices do they have that
  • 00:06:40
    might be useful for a
  • 00:06:42
    compromise are there people that we can
  • 00:06:45
    social engineer we need email addresses
  • 00:06:47
    to Fish phone numbers to call so we can
  • 00:06:50
    impersonate uh are there names and job
  • 00:06:53
    roles to Target and also their physical
  • 00:06:56
    presence you know do they have areas
  • 00:07:00
    where we might be able to sneak in let's
  • 00:07:01
    just take a look at like a a overview
  • 00:07:04
    picture of their facility okay could we
  • 00:07:07
    plant sniffing or snooping devices could
  • 00:07:09
    we sit in a parking lot here cuz people
  • 00:07:12
    go in and out of the front door here we
  • 00:07:15
    are also going to look for Wi-Fi signals
  • 00:07:17
    and if there aren't any could we set
  • 00:07:19
    some
  • 00:07:20
    up so these are the things that we want
  • 00:07:23
    to think about when we first start
  • 00:07:25
    hacking when we start with footprinting
  • 00:07:30
    so these are the things we're going to
  • 00:07:31
    think about when we first start hacking
  • 00:07:34
    when we start with
  • 00:07:36
    footprinting and now on to the next
  • 00:07:40
    topic
タグ
  • Footprinting
  • Hacking
  • Cybersecurity
  • Reconnaissance
  • Information Gathering
  • Passive Footprinting
  • Active Footprinting
  • Open Source Intelligence
  • Social Engineering
  • Network Security