We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Footprinting for security auditors

Formal Metadata

Title
Footprinting for security auditors
Title of Series
Number of Parts
611
Author
License
CC Attribution 2.0 Belgium:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language
Production Year2017

Content Metadata

Subject Area
Genre
Abstract
Footprinting is one of the most important techniques security auditing, sinceallows them gather information about the target we are analysing. In the process to collect information about our target we can diferentiate twophases,the first one is where we obtain public information without interactwith the objective and the second one is where we can use tools such as portscanning. In the process to collect information about our target we can diferentiate twophases, the first one is the passive where we obtain public information aboutour target without interact with the objective and the second one is the phasewhere we can use tools such as port scanning or banner grabbing. These could be the talking points: 1.Introduction to footprinting I will comment the main footprinting phases: Passive Footprinting where we collect public information and building a map ofthe server or domain objective, without interacting directwith it. Active Footprinting where there is an active target identification through andtechniques such as port scanning, and different identifications of services,operating systems and server banners. 2.Footprinting tools For applying footprinting techniques we can use tools for obtain domaininformation such as whois,apply inverse querys from DNS and name servers. Alsowe can use third services such as robtex and serversniff for obtain moreinformation. We can use public information sources,between these tools we canhighlight shodan,scans,zmap and censys 3.Port scanning with nmap With nmap we can check ports open for a target ip or domain and with nmapscripts we can check vulnerabilities in open ports For example,if the mysqlport is opened,check if the server has some vulnerability relationed with thisservice.I will show nmap scripts for checking this vulnerabilities.