information gathering

29
Information Gathering Part-3 Maulik Kotak (ROCKHACK)

Upload: cyberstone

Post on 15-Nov-2014

933 views

Category:

Education


1 download

DESCRIPTION

Information gathering is the process of collecting the information from different places about any individual company, organization, server, IP address or person. Information gathering is the first step of hacking and most of the time of hacker spend his time in this process. 90% of time of a hacker spend in information gathering. Information gathering plays a very vital role for both investigating and attacking purposes.

TRANSCRIPT

Page 1: Information gathering

Information Gathering

Part-3Maulik Kotak(ROCKHACK)

Page 2: Information gathering

./whoami

0 If You want to Hack some one First Hack Your self.

0 I am NOT a Hacker Just Learner as Security analyst.

Page 3: Information gathering

Information Gathering

0 “If you know the enemy and know yourself you need not fear the results of a hundred battles”

Page 4: Information gathering

Session Flow

0 Information Gathering- Definition0 Initial Info gathering of websites.0 IP range Lookup 0DNS information gathering.0Web Hosting info gathering. 0Understanding hosting control Panels.0Subdomains.0Whois information.

Page 5: Information gathering

Session Flow

0 Info Gathering using blogs & forums.0 Info Gathering using search Engine0 Info Gathering using Meta tags & Words.0People Search.0 Info gathering using job portal websites.

Page 6: Information gathering

What is Information Gathering?

0 Information gathering is the process of collecting the information from different places about any individual company, organization, server, IP address or person.

0 Information gathering is the first step of hacking and most of the time of hacker spend his time in this process. 90% of time of a hacker spend in information gathering.

0 Information gathering plays a very vital role for both investigating and attacking purposes.

Page 7: Information gathering

Attacker’s Point of View

0 Attacker will first gather information like domain name, IP address, IP range, operating system, services, control panel, vulnerable services etc and later on exploit it.

0 Attackers use tools and social engineering to gather information.

0 For attacking an individual person he will find his name, address, date of birth, phone no and his personal information and then use that information for attacking that person.

Page 8: Information gathering

Investigator’s Point of View

0As an investigator information gathering is powerful tool used in investigation.

0 Investigator will gather information like traces of criminal, name, address, contact no, company information etc before taking any legal action.

0 Investigators use tools and social networking sites to gather information about criminal.

Page 9: Information gathering

Whois

0Whois is query to database to get following information.

1.Owner of website.2.Email id used to register domain.3.Domain registrar.4.Domain name server information.5.Related websites

Page 10: Information gathering

Whois

Whois.net has official database of all domains.

Page 11: Information gathering

Whois

Page 12: Information gathering

Reverse IP mapping

0Reverse IP will give number of websites hosted on same server.

0 If one website is vulnerable on the server then hacker can easily root the server.

Page 13: Information gathering

Trace Route

0Trace route gives useful information regarding number of servers between your computers & remote computers.

0Useful for investigation as well as different attacks.

0Visualroute, Neotrace.

Page 14: Information gathering

Trace Route

Page 15: Information gathering

Info. Gathering using Search Engine

0 Search engines are efficient mediums to get specific results according to your requirements.

0Google, yahoo, bing etc.. 0 search engine gives best results out of all.

Page 16: Information gathering

Info Gathering Using Search Engine

0 Maltego is an open source intelligence and forensics application.

0 It allows for the mining and gathering of information as well as the representation of this information in a meaningful way.

0 Coupled with its graphing libraries, Maltego, allows you to identify key relationships between information and identify previously unknown relationships between them.

Page 17: Information gathering

Maltego

Page 18: Information gathering

Information gathering using forum/blogs

• Almost 80% internet users use blogs/forums for knowledge sharing purpose.

• Information gathering from specific blog will also helpful in investigations.

Page 19: Information gathering

Information gathering using Jobs site

Page 20: Information gathering

Information Gathering Using Financial Services

Google Finance Yahoo Finance

Page 21: Information gathering

Info Gathering using Google Maps

Page 22: Information gathering

Information gathering using SN Website

Page 23: Information gathering

People Search

Page 24: Information gathering

Information gathering using E-Spiders

0Email Spiders are automated soft wares which captures email ids using spiders & store them on the database. Spammers are using email spiders to collect thousand emails for spamming purposes.

Page 25: Information gathering
Page 26: Information gathering

Monitoring Targets Using Google Alerts

0Google Alerts is a content monitoring service that automatically notifies users when new content from news, web, blogs, video and/or discussion groups matches a set of search terms selected by the & stored by the Google Alerts Service.

0Google Alerts help in monitoring a developing news story & keeping current on a competitor or industry.

Page 27: Information gathering

Google Alerts

Page 28: Information gathering

Information gathering using Web Archive

0Archive.org maintains logs of pages of website.

Page 29: Information gathering

THANK YOU !! For Regarding any question contact me !!

http://www.maulikkotak.webnode.comhttp://www.facebook.com/maulikkotakstar

http://www.twitter.com/maulikkotakstar