Transcript
Page 1: Information gathering

Information Gathering

Part-3Maulik Kotak(ROCKHACK)

Page 2: Information gathering

./whoami

0 If You want to Hack some one First Hack Your self.

0 I am NOT a Hacker Just Learner as Security analyst.

Page 3: Information gathering

Information Gathering

0 “If you know the enemy and know yourself you need not fear the results of a hundred battles”

Page 4: Information gathering

Session Flow

0 Information Gathering- Definition0 Initial Info gathering of websites.0 IP range Lookup 0DNS information gathering.0Web Hosting info gathering. 0Understanding hosting control Panels.0Subdomains.0Whois information.

Page 5: Information gathering

Session Flow

0 Info Gathering using blogs & forums.0 Info Gathering using search Engine0 Info Gathering using Meta tags & Words.0People Search.0 Info gathering using job portal websites.

Page 6: Information gathering

What is Information Gathering?

0 Information gathering is the process of collecting the information from different places about any individual company, organization, server, IP address or person.

0 Information gathering is the first step of hacking and most of the time of hacker spend his time in this process. 90% of time of a hacker spend in information gathering.

0 Information gathering plays a very vital role for both investigating and attacking purposes.

Page 7: Information gathering

Attacker’s Point of View

0 Attacker will first gather information like domain name, IP address, IP range, operating system, services, control panel, vulnerable services etc and later on exploit it.

0 Attackers use tools and social engineering to gather information.

0 For attacking an individual person he will find his name, address, date of birth, phone no and his personal information and then use that information for attacking that person.

Page 8: Information gathering

Investigator’s Point of View

0As an investigator information gathering is powerful tool used in investigation.

0 Investigator will gather information like traces of criminal, name, address, contact no, company information etc before taking any legal action.

0 Investigators use tools and social networking sites to gather information about criminal.

Page 9: Information gathering

Whois

0Whois is query to database to get following information.

1.Owner of website.2.Email id used to register domain.3.Domain registrar.4.Domain name server information.5.Related websites

Page 10: Information gathering

Whois

Whois.net has official database of all domains.

Page 11: Information gathering

Whois

Page 12: Information gathering

Reverse IP mapping

0Reverse IP will give number of websites hosted on same server.

0 If one website is vulnerable on the server then hacker can easily root the server.

Page 13: Information gathering

Trace Route

0Trace route gives useful information regarding number of servers between your computers & remote computers.

0Useful for investigation as well as different attacks.

0Visualroute, Neotrace.

Page 14: Information gathering

Trace Route

Page 15: Information gathering

Info. Gathering using Search Engine

0 Search engines are efficient mediums to get specific results according to your requirements.

0Google, yahoo, bing etc.. 0 search engine gives best results out of all.

Page 16: Information gathering

Info Gathering Using Search Engine

0 Maltego is an open source intelligence and forensics application.

0 It allows for the mining and gathering of information as well as the representation of this information in a meaningful way.

0 Coupled with its graphing libraries, Maltego, allows you to identify key relationships between information and identify previously unknown relationships between them.

Page 17: Information gathering

Maltego

Page 18: Information gathering

Information gathering using forum/blogs

• Almost 80% internet users use blogs/forums for knowledge sharing purpose.

• Information gathering from specific blog will also helpful in investigations.

Page 19: Information gathering

Information gathering using Jobs site

Page 20: Information gathering

Information Gathering Using Financial Services

Google Finance Yahoo Finance

Page 21: Information gathering

Info Gathering using Google Maps

Page 22: Information gathering

Information gathering using SN Website

Page 23: Information gathering

People Search

Page 24: Information gathering

Information gathering using E-Spiders

0Email Spiders are automated soft wares which captures email ids using spiders & store them on the database. Spammers are using email spiders to collect thousand emails for spamming purposes.

Page 25: Information gathering
Page 26: Information gathering

Monitoring Targets Using Google Alerts

0Google Alerts is a content monitoring service that automatically notifies users when new content from news, web, blogs, video and/or discussion groups matches a set of search terms selected by the & stored by the Google Alerts Service.

0Google Alerts help in monitoring a developing news story & keeping current on a competitor or industry.

Page 27: Information gathering

Google Alerts

Page 28: Information gathering

Information gathering using Web Archive

0Archive.org maintains logs of pages of website.

Page 29: Information gathering

THANK YOU !! For Regarding any question contact me !!

http://www.maulikkotak.webnode.comhttp://www.facebook.com/maulikkotakstar

http://www.twitter.com/maulikkotakstar


Top Related