Coconote
AI notes
AI voice & video notes
Try for free
🔍
Footprinting and Ethical Hacking Techniques
Mar 23, 2025
Footprinting Concepts Lecture Notes
Introduction
Hosts: Sophie and Daniel
Topic: Footprinting concepts, snooping, and ethical hacking
Footprinting = actively seeking information about a target, often for security assessment.
What is Footprinting?
Footprinting is a method of gathering information about a target organization.
Can be used by ethical hackers or malicious actors.
Aim: To gather technical, organizational, and industry-related information.
OSINT (Open Source Intelligence)
Footprinting often involves OSINT.
Gathering information from publicly available sources.
Importance of knowledge: "Knowledge is power."
Types of Footprinting
Passive Footprinting
No direct interaction with the target.
Example: Eavesdropping or browsing publicly available information (e.g., websites, social media).
Hard to detect; organizations often release this information intentionally.
Active Footprinting
Involves direct interaction with the target (e.g., querying servers, using tools).
More detectable; potential to trigger security alerts.
Example: DNS queries, port scans.
Information to Gather During Footprinting
System Information
Operating systems in use, services, usernames, passwords.
Network Information
Domain names, subdomains, firewall rules.
Organizational Information
Employee details, departments, contact info, organizational charts.
Example Sources of Information
Websites, financial reports, LinkedIn profiles, social media posts.
Potentially sensitive information can be unintentionally exposed.
Importance of Footprinting for Ethical Hacking
Helps identify security vulnerabilities based on gathered data.
Enables better targeting during penetration tests.
Essential for successful hacking attempts, as it informs attackers of possible weaknesses.
Conclusion
Footprinting is crucial for ethical hacking and identifying vulnerabilities.
Knowledge gained from footprinting lays the foundation for successful penetration testing.
Google Dorks
Introduction to Google Dorks
Not socially awkward people; rather, advanced search techniques using Google.
Used for footprinting and information gathering.
Basic Google Search Operators
Use quotes for exact phrases.
Use a minus sign to exclude terms.
Combine advanced search options for targeted results.
Applications of Google Dorking
Finding vulnerable servers, open databases, and sensitive information.
Example: Searching for specific vulnerabilities, server types, or configurations via Google.
Resources for Google Dorking
Two lists provided: one from 2020 and another from 2022.
Lists include various Google dorks for effective searches.
Explore the Google hacking database for new dorks and examples.
Shodan and Censys
Introduction
Focus: Using Shodan and Censys for footprinting and information gathering.
Both are search engines for discovering internet-connected devices.
What is Shodan?
A search engine for IoT and internet-connected devices.
Useful for ethical hackers and blue teams to discover assets.
Features of Shodan
Can search by IP, device type, and geographical location.
Information includes server types, operating systems, and running services.
Allows monitoring and analysis of devices.
What is Censys?
Similar platform to Shodan with a focus on discovering and analyzing internet-exposed devices.
Regularly probes public IP addresses and domains to curate data.
Comparison of Shodan and Censys
Both provide valuable data for ethical hackers.
Different filters and search capabilities.
Both tools are essential for thorough reconnaissance.
Subdomain Enumeration
Introduction
What is a subdomain?
A subdomain extends the main domain, used for organizing information.
Example:
blog.itpro.tv
is a subdomain of
itpro.tv
.
Importance of Subdomain Enumeration
Helps identify potential vulnerabilities in less secure areas of a network.
Essential for ethical hackers and bug bounty hunters to find exploitable weaknesses.
Techniques for Subdomain Enumeration
Google Search
Use
site:itpro.tv
to find subdomains directly.
View Page Source
Look through the HTML source code for subdomain references.
Automated Tools
Use Netcraft and Sublister to automate the search for subdomains.
Netcraft
: Provides DNS search capabilities and lists subdomains.
Sublister
: A GitHub tool for automated subdomain discovery.
Conclusion
Subdomain enumeration is a key part of the reconnaissance phase in ethical hacking.
By identifying subdomains, ethical hackers can broaden their attack surface and find vulnerabilities.
📄
Full transcript