Intelligence Gathering Techniques
Gathering Process Overview
Hacking Step
Hacking Step …
Gathering Process overview
Footprinting
DNS Query
Network Query Tools
Information to Gather
OS Identification
Point of Contact
Tools - Linux
Tools – Linux (2)
Tools - Windows
Traceroute
Traceroute - Network Mapping
Traceroute - Network Mapping
Traceroute - Network Mapping
Traceroute - Network Mapping
Traceroute - Network Mapping
Traceroute - Network Mapping
Traceroute - Network Mapping
Whois
Introduction
Ping Sweeps
PING SWEEPS
Broadcast ICMP
PING Sweeps S (SYN & ISN) + ACK[ C (SYN+!) ] RESET (not active)
PING Sweeps Target System
PORT SCANNING
Port Scanning Types SYN packet
Port Scanning Type SYN packet
Port Scanning Type
PORT Scanning
PORT Scanning
Operating System Detection
Operating System Detection
Operating System Detection
Operating System Detection
Firewalking
How does Firewalking work?
What Firewalking needs?
Getting the Waypoint
Getting the Destination
How to identify/avoid threats?
Some tools to help us
Introduction to Enumeration
NBTscan
Null Session Information
Demonstration of Null Sessions
Net. BIOS Enumeration Tools
Net. BIOS Enumeration Tools (continued)
Net use
Additional Enumeration Tools
Net. Scan. Tools Pro
Dump. Sec
Hyena
Nessus. WX
Nessus. WX (continued)
Enumerating the *NIX Operating System
UNIX Enumeration