100% found this document useful (1 vote)
286 views20 pages

Ethical Hacking: Footprinting & Scanning

After getting this tutorial you will know how to do information gathering which is very easy to do. And information gathering is used to collect information about a victim. So don't miss this tutorial and please do not forget to give review or follow me. Written by: Nirav patel

Uploaded by

Nirav Patel
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
286 views20 pages

Ethical Hacking: Footprinting & Scanning

After getting this tutorial you will know how to do information gathering which is very easy to do. And information gathering is used to collect information about a victim. So don't miss this tutorial and please do not forget to give review or follow me. Written by: Nirav patel

Uploaded by

Nirav Patel
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

FOOTPRINTING AND SCANNING

Written by: Nirav Patel Contact links: facebook.com/patelniravv twitter.com/niravvhackky

Topics to be covered
What is HDLC What is shared Server What is Dedicated Server How to check website whether it is on shared or dedicated What is Footprinting Website and tool used in Footprinting How to do Footprinting What is Scanning Types of Scanning Tool used in Scanning How to do Scanning How to create scanning report Explanation of last 3 steps of HDLC How to be anonymous on internet

1|Page

What is HDLC
HDLC means Hackers Development Life Cycle. How hackers prepared a step by step plan for an attack against victim.

Fig: Hackers Development Life Cycle (HDLC)

Steps: Step-1: Reconnaisance/Footprinting Step-2: Scanning Step-3: Gaining Access Step-4: Maintaing Access Step-5: Covering Tracks Generally step-1 and step-2 are not followed by a black hat hackers who uses their skill for dishonorable purpose, whereas an ethical/professional/white hat hacker follows the steps to secure the information and to successfully analyze the attack. Lets go through some basic concept about server and then we can proceed with our module Footprinting and Scanning.
2|Page

What is Shared Server


The Shared server refers to web hosting service where many websites are hosted in one web server. Each website get its own partition in server so that it can be separated from other websites.Since this is an shared server the maintenance cost is also less. Shared server is capable of hosting high-level domains such as .com,.co,.org,.in etc

The above figure shows that many websites are hosted on the shared server with different domains.

Remember: Website hosted on shared server is open to hack because in shared server many websites are hosted, which no such protection. Even if one website is vulnerable than it can affect all websites. So please be careful while hosting your website on shared server.

3|Page

What is Dedicated Server


Dedicated server refers to web hosting service which will not share the server with any other website. It will host only the same type of domains but there can be many websites.

In the above figure the black rectangle indicates that this is mistake of website but the website www.manipal.edu is hosted in dedicated server.

Remember: Websites hosted on dedicated server is not easy to hack because the developer of the websites has put the same security measures in every websites. If anyone of them is secured than consider that all websites are also secured in same manner.

4|Page

Check website Shared or Dedicated


Lets check whether the website whether it is hosted on shared or dedicated Server. There is a cool website which suggested by great hacker RAHUL TYAGI. Follow the steps in order to check whether the website is on shared server or dedicated server.

Name of the website: www.yougetsignal.com Step-1: Open the above link in any browser. Step-2: Search for Reverse IP-Domain Check. See the below screenshot

Step-3: Click on Reverse IP Domain Check and enter the URL of website in order to check whether it is hosted on shared server or dedicated server.

So its all about the shared and dedicated server. Now lets come to module Footprinting and scanning.
5|Page

What is Footprinting

This is the first step of HDLC. This is also known as information gathering. Footprinting is used to collect information about the victim. This is an important step because professional hacker gets a quick start for planning the attack. Script kiddie or black hat hacker does not use this as they attack without any plan. After footprinting, following information can be gathered: 1) 2) 3) 4) 5) 6) 7) 8) IP address Creation date Last updated date Expiry date Name Address Phone number Email id

After collecting this information we can hack the victim in 3 ways. We will cover only one way of hacking in this article and it is with Email Hacking. Above concept of shared and dedicated server is to be explained because it is also a part of footprinting. *Tutorial on Email hacking will upload soon.

6|Page

Website and tool used in footprinting


Many online websites are there for footprinting means information gathering. But the best website that anyone can use and follow the steps Name of Website: www.who.is Step-1: Open the above URL in browser.

Step-2: Enter any website for information gathering and click on You will see all the relevant information regarding the website on the next screen. For more information on online website, google it.

7|Page

Tool used in Footprinting


Many tools are available on the internet, but to use the best tool is a sign of professional hacker. This tool is suggested by RAHUL TYAGI. Tool Name: Samspade Link: softpedia.com/dyn-postdownload.php?p=34862&t=4&i=1 Step-1: Download the tool samspade and open it.

8|Page

Step-2: Enter the website for information gathering and click on

The information gathered by the tool or by the website is same. The information which is gathered by footprinting is not much usable for successful attack because only name and address are not sufficient for an attack. Thus we need scanning process to do the job.

9|Page

What is Scanning

Scanning is the second step in HDLC and is very necessary for information gathering. Remember that both footprinting and scanning comes in Information gathering. Scanning is the process used to gather intelligent information about the victim, without which hacker cannot perform a successful attack. Below list of information can be obtained by doing scanning. 1) 2) 3) 4) IP address Operating system System architecture Services running on particular port(Banner Grabbing)

10 | P a g e

Types of Scanning
Scanning is of three types: 1) Port scanning 2) Network scanning 3) Vulnerability scanning Lets have a look at them. 1) Port scanning: Port scanning is used to check whether the server or victim is online or not and also for the IP address. To check this open cmd and type the ping command followed by the website name as shown in below screenshot.

2) Networking Scanning: Networking scanning is used to scan the network and collect the information of open ports, which services are running on particular port, which operating system is running and system architecture of the network. Practical session is mentioned later in this tutorial.

11 | P a g e

3) Vulnerability scanning: Vulnerability scanning is used to scan the network for finding the loopholes in the network and then plan for an attack against victim. More details will be covered in the upcoming article. Hint: For vulnerability scanning you can use backtrack OS.

Tool used in Scanning


Scanning is an important step in HDLC, tools used to perform scanning must also be best in its terms. There is a popular tool as suggested by great hacker RAHUL TYAGI. Tool name: Nmap for linux and it is also known as zenmap for windows. Link: http://nmap.org/dist/nmap-6.25-setup.exe

12 | P a g e

How to do Scanning (Use of nmap)


Here there is step by step by process of scanning. Just follow the steps and gather intelligent information about victim. Step-1: Open the tool namp.

Step-2: Enter the victims ipaddress.

13 | P a g e

Step-3: Click on

. Below screen will appear

Step-4: Scanning process gets completed. Now we can check the information that has been gathered by the tool. Lets see the open ports.

14 | P a g e

Step-5: Goto the host detail tab to check the operating system of the server.

Note: This indicate that this website which is hosted on a linux server and is 89% secure so its difficult to hack. If this accuracy is below 60% than it is easy to hack.

15 | P a g e

How to create Scanning report


It is very easy to create scanning report. Scanning report is necessary to create if you are a security researcher. Follow the below steps. Step-1: After scanning process get over. Just goto scan tab and select Save Scan.

Step-2: Select destination where you want to store th report.

Thats all, you have saved your scanning report.

16 | P a g e

Explanation of Last three steps in HDLC


The third step in Hackers Development Life Cycle is Gainaing Access. It is the step where the actual attack on victim starts. Hacker after knowing the OS (linux or windows) victim is using , he will plan his attack based on the respective OS. This is very pratical step because a hacker has to apply all the attacks to hack the victim.

The fourth step in Hackers Development Life Cycle is Maintaining Access. Consider a scenario that a hacker had attacked on a website but his fortune are not in his favour and didnt find anything useful but hoping that it might get some useful information in future , he will create a backdoor which will be open for him the next time. If next time any important data uploads in website so backdoor will help the hacker to get in to that information.

The fifth step in Hackers Development Life Cycle is Covering Tracks. This is a simple step because only one file has to be deleted after getting to the server but it needs to be deleted as it keeps the presence of you. Remember that every website you visit, your ipaddress is also stored in their logs so dont forget to delete the logs because you can be easily traceback by the log.

17 | P a g e

How to be anonymous on internet


Remember, being anonymous over the internet is a crime. But the best part of being anonymous is that after crime no will catch because we are anonymous. There are many steps for being anonymous. 1) 2) 3) 4) Use proxy server Use Virtual Private Network(VPN) Use firefox add-on Use softwares- proXPN, Ultrasurf,tor browser etc.

1) Proxy server: Dont use proxy server as they store logs. So anyone can easily be caught. But still if you want to use proxy server then use www.anonymizer.ru as this a russian proxy and made by hackers so they dont store your ipaddress and less chance to get caught. 2) VPN: Hacker use VPN and also suggest to use because its creates virtual private network and do not store logs in it. 3) Fire fox (Add-on): There is a cool add-on name anonymoX. Install this addon and activate it. And no one will caught you because this add-on is created by Best hacking group called Anonymous. And it stores your logs but only for five minute not more than that. So you are 100% secure. 4) proXPN: This software is also cool. This is freeware software and uses 2048 bit encryption key which is impossible to decrypt and you are 100% secure and even data is secured over the internet

Warning: This tutorial is only for educational purpose. Please dont scan any of the online banking website, CBI, CIA, Indian government website or any sensitive website. We are not reposible for this.

18 | P a g e

Credit to Rahul Tyagi

19 | P a g e

You might also like