Question

In: Computer Science

Write down a detailed report on information gathering phase of ethical hacking and identify some tools...

Write down a detailed report on information gathering phase of ethical hacking and identify some tools that can be used in this phase.

*in your words.

**please write it by computer typing so it will be easy to copy it.

***Type report sources at the end of the report.

Solutions

Expert Solution

Information Gathering and getting to know the target systems is the first process in ethical hacking. Reconnaissance is a set of processes and techniques (Footprinting, Scanning & Enumeration) used to covertly discover and collect information about a target system.

During reconnaissance, an ethical hacker attempts to gather as much information about a target system as possible, following the seven steps listed below −

  • Gather initial information
  • Determine the network range
  • Identify active machines
  • Discover open ports and access points
  • Fingerprint the operating system
  • Uncover services on ports
  • Map the network

Reconnaissance takes place in two parts − Active Reconnaissanceand Passive Reconnaissance.

Footprinting is a part of reconnaissance process which is used for gathering possible information about a target computer system or network. Footprinting could be both passive and active.

Footprinting is basically the first step where hacker gathers as much information as possible to find ways to intrude into a target system or at least decide what type of attacks will be more suitable for the target.

During this phase, a hacker can collect the following information −

  • Domain name
  • IP Addresses
  • Namespaces
  • Employee information
  • Phone numbers
  • E-mails
  • Job Information

In the following section, we will discuss how to extract the basic and easily accessible information about any computer system or network that is linked to the Internet.

Domain Name Information

You can use http://www.whois.com/whois website to get detailed information about a domain name information including its owner, its registrar, date of registration, expiry, name server, owner's contact information, etc.

Email Harvesting

The theharvester tool available in Kali-Linux is an e-mail accounts, username, and hostname/ subdomains gathering tool.

As an example, if you want to find e-mail addresses and hostnames for a target domain using Google, following is the appropriate command:

#./theHarvester.py -d targetdomain -l 100 -b google

Figure: Email Harvesting

Email harvesting can be used by hackers to carry out a phishing campaign against an entire organization. This is one aspect of how emails can be misused. Computer users, who are often unaware of phishing attacks can fall victim and end up loosing confidential information to the hackers.

Finding IP Address

You can use ping command at your prompt. This command is available on Windows as well as on Linux OS. Following is the example to find out the IP address of tutorialspoint.com

$ping tutorialspoint.com

Finding Hosting Company

Once you have the website address, you can get further detail by using ip2location.com website. Following is the example to find out the details of an IP address −

Here the ISP row gives you the detail about the hosting company because IP addresses are usually provided by hosting companies only.

IP Address Ranges

Small sites may have a single IP address associated with them, but larger websites usually have multiple IP addresses serving different domains and sub-domains.

You can obtain a range of IP addresses assigned to a particular company using American Registry for Internet Numbers (ARIN).

You can enter company name in the highlighted search box to find out a list of all the assigned IP addresses to that company.

History of the Website

It is very easy to get a complete history of any website using www.archive.org.

You can enter a domain name in the search box to find out how the website was looking at a given point of time and what were the pages available on the website on different dates.

The term OS fingerprinting in Ethical Hacking refers to any method used to determine what operating system is running on a remote computer. This could be −

  • Active Fingerprinting − Active fingerprinting is accomplished by sending specially crafted packets to a target machine and then noting down its response and analyzing the gathered information to determine the target OS. In the following section, we have given an example to explain how you can use NMAP tool to detect the OS of a target domain.
  • Passive Fingerprinting − Passive fingerprinting is based on sniffer traces from the remote system. Based on the sniffer traces (such as Wireshark) of the packets, you can determine the operating system of the remote host.

We have the following four important elements that we will look at to determine the operating system −

  • TTL − What the operating system sets the Time-To-Live on the outbound packet.
  • Window Size − What the operating system sets the Window Size at.
  • DF − Does the operating system set the Don't Fragment bit.
  • TOS − Does the operating system set the Type of Service, and if so, at what.

By analyzing these factors of a packet, you may be able to determine the remote operating system. This system is not 100% accurate, and works better for some operating systems than others.

Basic Steps

Before attacking a system, it is required that you know what operating system is hosting a website. Once a target OS is known, then it becomes easy to determine which vulnerabilities might be present to exploit the target system.

Below is a simple nmap command which can be used to identify the operating system serving a website and all the opened ports associated with the domain name, i.e., the IP address.

$nmap -O -v tutorialspoint.com

If you do not have nmap command installed on your Linux system, then you can install it using the following yum command −

$yum install nmap

You can go through nmap command in detail to check and understand the different features associated with a system and secure it against malicious attacks.

Port Scanning

We have just seen information given by nmap command. This command lists down all the open ports on a given server.

PORT       STATE   SERVICE

22/tcp     open    ssh

80/tcp     open    http

443/tcp    open    https

3306/tcp   open    mysql

You can also check if a particular port is opened or not using the following command −

$nmap -sT -p 443 tutorialspoint.com

Once a hacker knows about open ports, then he can plan different attack techniques through the open ports.

Ping Sweep

A ping sweep is a network scanning technique that you can use to determine which IP address from a range of IP addresses map to live hosts. Ping Sweep is also known as ICMP sweep.

You can use fping command for ping sweep. This command is a ping-like program which uses the Internet Control Message Protocol (ICMP) echo request to determine if a host is up.

fping is different from ping in that you can specify any number of hosts on the command line, or specify a file containing the lists of hosts to ping. If a host does not respond within a certain time limit and/or retry limit, it will be considered unreachable.

Quick Fix

To disable ping sweeps on a network, you can block ICMP ECHO requests from outside sources. This can be done using the following command which will create a firewall rule in iptable.

$iptables -A OUTPUT -p icmp --icmp-type echo-request -j DROP

DNS Enumeration

Domain Name Server (DNS) is like a map or an address book. In fact, it is like a distributed database which is used to translate an IP address 192.111.1.120 to a name www.example.com and vice versa.

DNS enumeration is the process of locating all the DNS servers and their corresponding records for an organization. The idea is to gather as much interesting details as possible about your target before initiating an attack.

You can use nslookup command available on Linux to get DNS and host-related information. In addition, you can use the following DNSenum script to get detailed information about a domain −

DNSenum.pl

DNSenum script can perform the following important operations −

  • Get the host's addresses
  • Get the nameservers
  • Get the MX record
  • Perform axfr queries on nameservers
  • Get extra names and subdomains via Google scraping
  • Brute force subdomains from file can also perform recursion on subdomain that has NS records
  • Calculate C class domain network ranges and perform whois queries on them
  • Perform reverse lookups on netranges

SOME TOOLS NAME:

OSINT Framework, CheckUserNames, HaveIbeenPwned, BeenVerified , Censys,BuiltWith,Google Dorks,Maltego, Recon-Ng,Shodan


Related Solutions

Case study: Bophal disaster. Research and write a detailed report on the disaster and some of...
Case study: Bophal disaster. Research and write a detailed report on the disaster and some of the key lessons from this inciden
Write a detailed research report on GEARBOXES
Write a detailed research report on GEARBOXES
What ethical guidelines would you set for gathering and sharing information? Is it possible to be...
What ethical guidelines would you set for gathering and sharing information? Is it possible to be a servant leader in every situation? Are there any settings where you couldn’t be a servant leader? What does it mean to you to feel psychologically safe in a group? What examples of moral exclusion have you seen in your group experiences?
1) What are the fundamental ethical principles detailed in the Belmont Report, and how are they...
1) What are the fundamental ethical principles detailed in the Belmont Report, and how are they implemented in clinical research? (100 words detial please ) 2) In what phase of clinical trials does the evaluation of safety data take place?
in travel and hospitality services, identify what are the methodology components, ethical consideration and statistical tools...
in travel and hospitality services, identify what are the methodology components, ethical consideration and statistical tools can be considered?
Effect of wind rang and endurance write a report about it and write down the references...
Effect of wind rang and endurance write a report about it and write down the references any assumed number
Write down a detailed description of "a buyer behaivior" refer to the chapter6 that we had...
Write down a detailed description of "a buyer behaivior" refer to the chapter6 that we had today
Write a detailed report to a technical manager on the following items. You work as field...
Write a detailed report to a technical manager on the following items. You work as field engineer at Menco Company and dealing with repair of Getinge autoclaves. You recently attended to three autoclaves at Uro Hospital. The first and second autoclave had error of liquid cycle activated while running, you bypassed the door emergency switch and its functional but need replacement of faulty spares. The third had vaccum pump failure, faulty vaccum pump. The report to be detailed and fit...
Draft a detailed report on the concepts of Information Marketing decisions and how these processes, concepts,...
Draft a detailed report on the concepts of Information Marketing decisions and how these processes, concepts, and or theories influence business decisions? Using at least two external references research an organization of managers that use these approaches and present your findings. In doing so, explain a manager's role with regards to creating an ethical environment.
Draft a detailed report on the concepts of Information Marketing decisions and how these processes, concepts,...
Draft a detailed report on the concepts of Information Marketing decisions and how these processes, concepts, and or theories influence business decisions? Using at least two external references research an organization of managers that use these approaches and present your findings. In doing so, explain a manager's role with regards to creating an ethical environment. Writing Requirements APA format, 3–4 pages in length (excluding cover page, abstract, and reference list)
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT