Footprinting is one of the most important techniques security auditing, sinceallows them gather information about the target we are analysing.
In the process to collect information about our target we can diferentiate twophases,the first one is where we obtain public information without interactwith the objective and the second one is where we can use tools such as portscanning.
In the process to collect information about our target we can diferentiate twophases, the first one is the passive where we obtain public information aboutour target without interact with the objective and the second one is the phasewhere we can use tools such as port scanning or banner grabbing.
These could be the talking points:
1.Introduction to footprinting I will comment the main footprinting phases:
Passive Footprinting where we collect public information and building a map ofthe server or domain objective, without interacting directwith it.
Active Footprinting where there is an active target identification through andtechniques such as port scanning, and different identifications of services,operating systems and server banners.
2.Footprinting tools
For applying footprinting techniques we can use tools for obtain domaininformation such as whois,apply inverse querys from DNS and name servers. Alsowe can use third services such as robtex and serversniff for obtain moreinformation. We can use public information sources,between these tools we canhighlight shodan,scans,zmap and censys
3.Port scanning with nmap
With nmap we can check ports open for a target ip or domain and with nmapscripts we can check vulnerabilities in open ports For example,if the mysqlport is opened,check if the server has some vulnerability relationed with thisservice.I will show nmap scripts for checking this vulnerabilities. |