Lab Duration
Time: 50 ]Minutes
Overview of Footprinting
Before a penetration test even begins, penetration testers spend time with their clients working out the scope, mles, and goals ot the test. The penetration testers may break 111 using any means necessary, from information found 111 the dumpster, to web application security holes, to posing as the cable guy.
After pre-engagement activities, penetration testers begin gathering information about their targets. Often all the information learned from a client is the list of IP addresses and/or web domains that are 111 scope. Penetration testers then learn as much about the client and their systems as possible, from searching for employees on social networking sites to scanning die perimeter for live systems and open ports. Taking all the information gathered into account, penetration testers sftidv the systems to find the best routes of attack. Tins is similar to what an attacker would do or what an invading army would do when trying to breach the perimeter. Then penetration testers move into vulnerabilitv analysis, die first phase where they are
actively engaging the target. Some might say some port scanning does complete connections. However, as cybercrime rates nse, large companies, government organizations, and other popular sites are scanned quite frequendy. During vulnerability analysis, a penetration tester begins actively probing the victim systems for vulnerabilities and additional information. Only once a penetration tester has a hill view of the target does exploitation begin. Tins is where all of the information that has been meticulously gathered comes into play, allowing you to be nearly 100% sure that an exploit will succeed.
Once a system has been successfully compromised, the penetration test is over, right? Actually, that's not nght at all. Post exploitation is arguably the most important part of a penetration test. Once you have breached the perimeter there is whole new set of information to gather. You may have access to additional systems that are not available trom the perimeter. The penetration test would be useless to a client without reporting. You should take good notes during the other phases, because during reporting you have to tie evervdiing you found together 111 a way everyone from the IT department who will be remediating the vulnerabilities to the business executives who will be approving die budget can understand.
Lab Tasks
Pick an organization diat you feel is worthy of vour attention. Tins could be an
educational institution, a commercial company. 01 perhaps a nonprofit charity.
Recommended labs to assist you 111 footprinting;
■ Basic Network Troubleshooting Using the ping utility and nslookup Tool
■ People Search Using Anywho and Spokeo Online Tool
■ Analyzing Domain and IP Address Queries Using SmartWhois
■ Network Route Trace Using Path Analyzer Pro
■ Tracing Emails Using eMailTrackerPro Tool
■ Collecting Information About a target’s Website Using Firebug
■ Mirroring Website Using HTTrack Web Site Copier Tool
■ Extracting Company’s Data Using Web Data Extractor
■ Identifying Vulnerabilities and Information Disclosures 111 Search Engines using Search Diggity
Lab Analysis
Analyze and document the results related to die lab exercise. Give your opinion 011 your target’s security posture and exposure through public and free information.
Không có nhận xét nào:
Đăng nhận xét