This is an old revision of the document!


Lab 1 - Collecting Information and Scanning

The lab will be run on Linux, using the BackTrack image available here.

Collecting Information

  • Passive activity - no interaction with the target
  • Useful information:
    • External IP addresses
    • Employee phone numbers and e-mails
    • Employee profiles (Facebook, Google+, LinkedIn, …)
    • Active hosts and services (internal penetration testing)
  • Techniques:
    • Google hacking
    • Whois and DNS queries
    • Using public databases: Netcraft.com , zone-h.com
    • Web site inspection
    • Network sniffing

Google Hacking

  • site: restricts the results of the query to the specified site: site:pub.ro “error in your SQL syntax”
  • intitle: / allintitle: - the keywords cand be found in the page title: intitle:“index of” intext:“parent directory”
  • filetype: specifies the file extension: filetype:doc site:pub.ro
  • Explicit Inclusion: +: +123456 “yahoo.com” site:pastebin.com
  • Explicit Exclusion: -: +virus –biology

Google Hacking - Tasks

Choose a site: xyz

  • Search for all xls files that can be accesed on the xyz site
  • Check if directory browsing is possible on the xyz site
  • Search for subdomains of xyz
  • Search for mysql dump filetype:sql. What is the result?
  • Search for live webcams: inurl:/view/index.shtml inurl:viewerFrame?Mode=

Whois Queries

Useful information:

  • DNS servers
  • IP addresses
  • Location and address
  • Contact persons (name, phone, e-mail)
  • Examples:
    • whois cisco.com
    • whois 128.107.241.185

Whois Queries - Tasks

  • Identify the IP addresses and location of xyz.

DNS Queries

  • Tools: dig, host, nslookup
  • Query types: A, NS, MX, PTR, AXFR
  • Examples:
    • E-mail servers:
      • dig pub.ro mx
      • host –t mx pub.ro
    • Reverse DNS:
      • dig @ns1.roedu.net ptr 60.166.85.141.in-addr.arpa
      • host 141.85.166.60



DNS Queries - Tasks

  • What are the DNS servers for xyz?
  • For each of the previous servers, request a zone transfer (type=axfr)

Scanning

cns/laboratoare/laborator-01.1350281835.txt.gz · Last modified: 2012/10/15 09:17 by traian.popeea
CC Attribution-Share Alike 3.0 Unported
www.chimeric.de Valid CSS Driven by DokuWiki do yourself a favour and use a real browser - get firefox!! Recent changes RSS feed Valid XHTML 1.0