Reconnaissance
  - Looking for high-level information on a target
- Types
    
      - Anonymous - information gathering without revealing anything about yourself
- Pseudonymous - making someone else take the blame for your actions
 
Four Main Focuses
  - Know the security posture
- Reduce the focus area
- Identify vulnerabilities
- Draw a network map
  - Active - requires attacker to touch the device or network
    
      - Social engineering and other communication that requires interaction with target
 
- Passive - measures to collect information from publicly available sources
    
      - Websites, DNS records, business information databases
 
Competitive Intelligence - information gathered by businesses about competitors
Alexa.com - resource for statistics about websites
Search Engines
  - NetCraft - information about website and possibly OS info
- Job Search Sites - information about technologies can be gleaned from job postings
- Google
    
      - filetype:  - looks for file types
- index of - directory listings
- info: - contains Google’s information about the page
- intitle: - string in title
- inurl: - string in url
- link: - finds linked pages
- related: - finds similar pages
- site: - finds pages specific to that site
 
- Metagoofil - uses Google hacks to find information in meta tags
Website Footprinting
  - Web mirroring - allows for discrete testing offline
    
      - HTTrack
- Black Widow
- Wget
- WebRipper
- Teleport Pro
- Backstreet Browser
 
- Archive.org - provides cached websites from various dates which possibly have sensitive information that has been now removed
Email Footprinting
  - Email  header - may show servers and where the location of those servers are
- Email tracking - services can track various bits of information including the IP address of where it was opened, where it went, etc.
DNS Footprinting
  - 
    Ports 
      - Name lookup - UDP 53
- Zone transfer - TCP 53
 
- 
    Zone transfer replicates all records 
- 
    Name resolvers answer requests 
- 
    Authoritative Servers hold all records for a namespace 
- 
    DNS Record Types 
      - 
        
          
            
              | Name | Description | Purpose |  
              | SRV | Service | Points to a specific service |  
              | SOA | Start of Authority | Indicates the authoritative NS for a namespace |  
              | PTR | Pointer | Maps an IP to a hostname |  
              | NS | Nameserver | Lists the nameservers for a namespace |  
              | MX | Mail Exchange | Lists email servers |  
              | CNAME | Canonical Name | Maps a name to an A reccord |  
              | A | Address | Maps an hostname to an IP address |  
 
 
- 
    DNS Poisoning - changes cache on a machine to redirect requests to a malicious server 
- 
    DNSSEC - helps prevent DNS poisoning by encrypting records 
- 
    SOA Record Fields 
      - Source Host - hostname of the primary DNS
- Contact Email - email for the person responsible for the zone file
- Serial Number - revision number that increments with each change
- Refresh Time - time in which an update should occur
- Retry Time - time that a NS should wait on a failure
- Expire Time - time in which a zone transfer is allowed to complete
- TTL - minimum TTL for records within the zone
 
- 
    IP Address Management 
      - ARIN - North America
- APNIC - Asia Pacific
- RIPE - Europe, Middle East
- LACNIC - Latin America
- AfriNIC - Africa
 
- 
    Whois - obtains registration information for the domain 
- 
    Nslookup - performs DNS queries 
      - nslookup [ - options ] [ hostname ]
- interactive zone transfer
        
          - nslookup
- server 
- set type = any
- ls -d domainname.com
 
 
- 
    Dig - unix-based command like nslookup 
Network Footprinting
  - IP address range can be obtained from regional registrar (ARIN here)
- Use traceroute to find intermediary servers
    
      - traceroute uses ICMP echo in Windows
 
- Windows command - tracert
- Linux Command - traceroute
Other Tools
  - OSRFramework - uses open source intelligence to get information about target
- Web Spiders - obtain information from the website such as pages, etc.
- Social Engineering Tools
    
      - Maltego
- Social Engineering Framework (SEF)
 
- Shodan - search engine that shows devices connected to the Internet
Computer Security Incident Response Team (CSIRT) - point of contact for all incident response services for associates of the DHS