Footprinting, also known as reconnaissance, is the preparatory phase where an attacker gathers as much information as possible about a target before launching an attack. It is the first step in evaluating the security posture of an organization’s IT infrastructure. The goal is to collect maximum information about a computer system or network to create a security profile blueprint. Footprinting can be passive (gathering information without direct interaction, e.g., through public sources) or active (gathering information with direct interaction, e.g., scanning).
Information Obtained in Footprinting includes:
- Organization information: Employee details, contact information, branch locations, partners, web links, background, web technologies, news, press releases, legal documents, patents, and trademarks. This can help attackers identify key personnel for social engineering attacks.
- Network information: Domain and sub-domains, network blocks, network topology, trusted routers, firewalls, IP addresses of reachable systems, Whois records, and DNS records.
- System information: Web server OS, location of web servers, publicly available email addresses, usernames, and passwords.
Footprinting helps build a hacking strategy by uncovering vulnerabilities and identifying ways to exploit them.
1. Footprinting through Search Engines
Concept: Search engines are primary sources for extracting critical details about a target organization from the internet. They use automated software (crawlers) to index active websites. Advanced search operators, often called “Google Dorks,” create complex queries to find sensitive or hidden information.
Actions & Tools:
- Perform basic searches:
- Type the target organization’s name (e.g., “Microsoft”) into search engines like Google, Bing, Yahoo, Ask, AOL, Baidu, Yandex, WolframAlpha, and DuckDuckGo to find physical location, contact addresses, services, and number of employees.
- Use advanced Google Hacking Techniques (Google Dorks):
- Understand operators: Use operator:search_term (no spaces).
- Specific operators:
- cache: Displays cached web pages.
- link: Lists pages linking to a specified page.
- related: Displays similar websites.
- info: Provides information Google has about a page.
- site: Restricts results to a specified site or domain (e.g., site:www.certifiedhacker.com).
- allinurl: Restricts results to pages with all keywords in the URL (e.g., allinurl:google career).
- inurl: Restricts results to pages with a specific keyword in the URL (e.g., inurl:copy site:www.google.com).
- intext: Displays results with a specific keyword in the webpage body (e.g., intext:”vpn configuration”).
- allintitle: Restricts results to pages with all keywords in the title (e.g., allintitle:detect malware).
- intitle: Restricts results to pages with a specific term in the title (e.g., malware detection intitle:help).
- inanchor: Restricts results to pages with query terms in anchor text (e.g., Anti-virus inanchor:Norton).
- allinanchor: Restricts results to pages with all query terms in anchor text (e.g., allinanchor:best cloud service provider).
- location: Finds information for a specific location (e.g., location:4 seasons restaurant).
- filetype: Searches for results based on file extension (e.g., jasmine.jpg for JPG files, or filetype:pdf site:eccouncil.org to find PDF files).
- source: Displays information from a specific website in Google News (e.g., Malware news source:”Hacker News”).
- phonebook: Finds residential/business phone numbers (e.g., phonebook:Sundar Pichai).
- before: Filters content published before a date (e.g., ransomware before:2020-06-29).
- after: Filters content published after a date (e.g., site:wikipedia.org after:2023-01-01 artificial intelligence).
- Use Google Hacking Database (GHDB): Access https://www.exploit-db.com/google-hacking-database to find queries (Google Dorks) for sensitive information like:
- Error messages with sensitive info.
- Files containing passwords or sensitive data.
- Sensitive directories.
- Login portals.
- Network/vulnerability data (IDS, firewall logs).
- Software version info.
- Web application source code.
- Connected IoT devices and control panels.
- Hidden web pages (intranet, VPN services).
- VPN-related information (e.g., inurl:sslvpn_logon.shtml intitle:”User Authentication” “WatchGuard Technologies”, inurl:/sslvpn/Login/Login, site:vpn.*.*/ intitle:”login”).
- OpenVPN static keys (—BEGIN OpenVPN Static key V1—” ext:key).
- Cisco ASA login pages (intitle:”SSL VPN Service” + intext:”Your system administrator provided the following information to help understand and remedy the security conditions:”).
- Leverage AI-powered search:
- ChatGPT/ShellGPT: Use prompts to automate Google hacking techniques (e.g., “Use filetype search operator to obtain pdf files on the target website eccouncil.org and store the result in the recon1.txt file”).
- Example command: lynx –dump “http://www.google.com/search?q=site:eccouncil.org+filetype:pdf” | grep “http” | cut -d “=” -f2 | grep -o “http[A&]*” > reconl.txt.
- Fortinet VPN login pages via AI: Prompt (e.g., “Use inurl search operator to obtain the Fortinet VPN login pages”) which can generate commands like lynx –dump “http://www.google.com/search?q=inurl:%22remote+login%22+fortinet+OR+fortigate+OR+%22ssl+vpn%22″|grep “http”| cut -d “” -f2|grep -o “http[A&]*”.
- Use SHODAN Search Engine: Access https://www.shodan.io to detect devices and networks with vulnerabilities, including VoIP and VPN information, and find devices based on city, country, hostname, OS, and IP address.
- Gather Information from Google Advanced Search, Advanced Image Search, and Reverse Image Search:
- Google Advanced Search: Access via https://www.google.com/advanced_search to precisely search for web pages, partners, vendors, clients, and affiliations.
- Google Advanced Image Search: Access via https://www.google.com/advanced_image_search to search images by color, domain, file type, size, or keyword to find images of targets, locations, or employees.
- Reverse Image Search: Access via https://www.google.com/imghp or use tools like TinEye, Yahoo Image Search, Bing Image Search, and Pinterest Reverse image search to use an image as a query and find its online locations and original source details.
- Gather Information from Video Search Engines:
- Search YouTube, Google Videos, Yahoo Videos, Bing Videos for video content related to the target.
- Analyze video metadata using tools like YouTube Metadata, YouTube DataViewer, MW Metadata, EZGif, and VideoReverser.com to extract hidden information (time/date, thumbnail) or convert video to text.
- Gather Information from Meta Search Engines:
- Use Startpage, MetaGer, and eTools.ch to send multiple search queries to several search engines simultaneously, gather diverse information (shopping sites, images, videos, blogs, news) while maintaining privacy (hiding IP address).
- Gather Information from File Transfer Protocol (FTP) Search Engines:
- Use NAPALM FTP Indexer (https://searchftps.net), FreewareWeb FTP File Search, Mamont, and Globalfilesearch.com to find files (business strategies, tax documents, personal employee records, financial records, licensed software) on FTP servers, many of which may be unsecured.
- Use specific Google Dorks to find FTP servers, juicy information, or passwords (e.g., site:.in | .com | .net intitle:”index of” ftp, intitle:”Index of ftp passwords”).
- Gather Information from IoT Search Engines:
- Use Shodan, Censys, and ZoomEye to find publicly accessible IoT devices (SCADA, traffic control, household appliances, CCTV).
- Obtain manufacturer details, geographical location, IP address, hostname, and open ports to establish backdoors.
2. Footprinting through Internet Research Services
Concept: Various internet research services provide sensitive information about a target’s infrastructure, physical location, and employee details, aiding in hacking strategy development.
Actions & Tools:
- Find a Company’s Top-Level Domains (TLDs) and Sub-domains:
- Search for the target company’s external URL in search engines like Google and Bing.
- Identify sub-domains (e.g., site:microsoft.com -inurl:www).
- Tools:
- Netcraft (https://www.netcraft.com): Provides Internet security services and analyzes market share of web servers, OS, hosting providers, SSL certificates, and can list sub-domains.
- DNSdumpster (https://dnsdumpster.com): Discovers hosts related to a domain, including sub-domains, IP addresses, and DNS servers.
- Pentest-Tools Find Subdomains (https://pentest-tools.com): Discovers sub-domains and their IP addresses, network information, HTTP servers, OS, and web platforms.
- AI-powered tools (ChatGPT): Use prompts like “Discover all the subdomains of ‘google.com’ using dig command” or “Use Sublist3r to gather a list of subdomains of the target organization eccouncil”.
- dig command: dig +short google.com NS | xargs -I{} dig +nocmd +noall +answer @{} google.com | grep -E ‘CNAME|A|AAAA’.
- Sublist3r tool: sublist3r -d eccouncil.org -o eccouncil_subdomains.txt.
- Extract Website Information from Archive.org:
- Use Internet Archive’s Wayback Machine (https://archive.org) to visit archived versions of websites, gathering information even if it has been removed from the current site (web pages, audio, video, images, text, software). This can reveal juicy information that has been cleaned up from the current site.
- Tools:
- Photon: Retrieve archived URLs of the target website from archive.org (e.g., python3 photon.py -u <URL of the Target Website> -l 3 -t 200 –wayback).
- Footprinting through People Search Services:
- Use public record websites to find personal information such as names, addresses, contact details, date of birth, family members, social networking profiles, property information, and even criminal checks. This information is beneficial for launching attacks.
- Tools: Spokeo (https://www.spokeo.com), Intelius, pipl, BeenVerified, Whitepages, Instant Checkmate, PeekYou.
- Footprinting through Job Sites:
- Gather valuable information about an organization’s operating system, software versions, infrastructure details, and database schema by analyzing job postings on recruitment pages. This can include hardware/software info, network-related info, technologies used (firewall, server type, OS, hypervisors, VMs), and key employee lists with email addresses.
- Review employee resumes for expertise, qualifications, and job history that may reveal technical details about the target IT infrastructure.
- Tools: Dice, LinkedIn, Glassdoor, Simply Hired.
- Dark Web Footprinting:
- The Dark Web (subset of the Deep Web) allows anonymous navigation and contains hidden, unindexed content not accessible by traditional browsers.
- Gather confidential information such as credit card details, passport info, ID details, medical records, social media accounts, and Social Security Numbers (SSNs).
- Tools:
- Tor Browser (https://www.torproject.org): Acts as a VPN, bouncing IP addresses through servers to access hidden content and encrypted databases.
- ExoneraTor, OnionLand Search engine.
- Searching the Dark Web with Advanced Search Parameters: Refine searches for specific data, such as sensitive documents, financial records, or login credentials.
- Parameters examples: Personal profiles (“John Doe” site:facebook.com OR site:linkedin.com), Scientific publications (“John Doe” site:scholar.google.com), Court records (“John Doe” court records), Member directories (“John Doe” site:example.com “employee directory”), Medical records (“John Doe” medical records), Location records (“John Doe” location history).
- Search queries for sensitive files on Dark Web using Tor Browser: filetype:pdf site:onion confidential (Sensitive PDFs), inurl:config filetype:txt password (Passwords in Config Files), filetype:xlsx site:onion financial (Financial Documents), filetype:sql site:onion dump (Database Dumps), filetype:csv site:onion email (Email Lists), intitle:”login credentials” filetype:docx (Login Credentials), filetype:xml inurl:config server (Server Configurations), filetype:key site:onion private (Private Keys), filetype:pdf site:onion “medical records” (Medical Records), filetype:ppt site:onion “business plan” (Business Plans), filetype:py site:onion “def ” (Source Code), filetype:docx site:onion “legal document” (Legal Documents), filetype:pdf site:onion “bank statement” (Bank Statements), filetype:pdf inurl:patent confidential (Intellectual Property), filetype:txt inurl:exploit “security vulnerability” (Security Vulnerabilities).
- Determining the Operating System (OS Fingerprinting):
- Tools:
- Netcraft (https://www.netcraft.com): Identify sites associated with the target domain and the OS running at each site.
- Shodan (https://www.shodan.io): Discover connected devices (routers, servers, IoT) and their OS, IP address, city, country, latitude/longitude, and hostname. Can also search for known vulnerabilities across Exploit DB, Metasploit, CVE, OSVDB, and Packetstorm.
- Censys (https://censys.io): Monitor IT infrastructure to discover devices, their OS, IP address, protocols, and geographical location.
- Tools:
- Competitive Intelligence Gathering:
- Identify, gather, analyze, verify, and use information about competitors to understand their activities, product positioning, customer feedback, and plans. This can be for strategic decisions or for building hacking strategies.
- Sources (Indirect Approach): Company websites, employment ads, support threads, reviews, search engines, online databases, social media postings, press releases, annual reports, trade journals, conferences, newspapers, patent and trademarks, product catalogs, retail outlets, analyst and regulatory reports, customer and vendor interviews, industry-specific blogs and publications, legal databases, business information databases, online job postings, financial filings, and technology solutions.
- Information Resource Sites:
- EDGAR Database (https://www.sec.gov/edgar): Automated collection of company filings with the U.S. SEC.
- D&B Hoovers (https://www.dnb.com): Commercial database of business records and analytics.
- LexisNexis (https://www.lexisnexis.com): Electronic database for legal and public records, news, and business sources.
- Business Wire (https://www.businesswire.com): Press release distribution and regulatory disclosure.
- Factiva (https://www.dowjones.com): Global news database and licensed content provider.
- MarketWatch (https://www.marketwatch.com): Tracks market pulse for investors, business news, and financial info.
- The Wall Street Transcript (https://www.twst.com): Publishes industry reports and interviews with CEOs.
- Euromonitor (https://www.euromonitor.com): Provides strategy research for consumer markets.
- Experian (https://www.experian.com): Insights into competitors’ marketing strategies.
- The Search Monitor (https://www.thesearchmonitor.com): Competitive intelligence for monitoring brand, trademark use, and advertising.
- USPTO (https://www.uspto.gov): Information related to patent and trademark registration.
- SEMRush (https://www.semrush.com): Competitive keyword research tool.
- ABI/INFORM Global (https://www.proquest.com): Business database with financial information and business trends.
- SimilarWeb (https://www.similarweb.com): Aggregates data for website and mobile app traffic, geography, and referral data.
- SERanking (https://seranking.com): Online competitor analysis tool for website traffic dynamics and PPC research.
- Finding the Geographical Location of the Target:
- Tools: Google Earth (https://earth.google.com), Google Maps, Wikimapia, Apple Maps, Waze.
- Identify entrances, security cameras, gates, hiding places, weak spots in perimeter fences, utility resources.
- Gathering Information from Financial Services:
- Search for financial data like stock quotes, charts, financial news, and portfolios to obtain market value, company profiles, competitor details, and press releases.
- Tools: Google Finance (https://www.google.com/finance), MSN Money, Yahoo Finance, Investing.com.
- Gathering Information from Business Profile Sites:
- Retrieve business information including location, addresses, contact information, employee database, department names, type of service, and industry.
- Tools: opencorporates, Crunchbase, corporationwiki.
- Monitoring Targets Using Alerts:
- Set up automated alerts to receive up-to-date information when target names, member names, websites, or projects are mentioned online.
- Tools: Google Alerts (https://www.google.com/alerts), X Alerts, Giga Alerts.
- Tracking the Online Reputation of the Target:
- Monitor a company’s reputation on the internet to gain search engine ranking information, email notifications, and social news. Transparency in ORM can provide genuine information.
- Tools: Mention (https://mention.com), ReviewPush, Reputology.
- Gathering Information from Groups, Forums, and Blogs:
- Join target organization’s employee groups (with fake profiles) to collect public network, system, and personal information.
- Search by FQDNs, IP addresses, and usernames.
- Employee information: Full name, place of work/residence, contact numbers, email addresses, pictures (residence/work/awards), upcoming goals.
- Tools: Google Groups, LinkedIn Groups.
- Gathering Information from Public Source-Code Repositories:
- Identify information about developers and technologies used, including configuration files, private SSH/SSL keys, source-code files, dynamic libraries, and software tools.
- Tools:
- Recon-ng (https://github.com): A full-featured reconnaissance framework for web-based reconnaissance, used to discover public source-code repositories.
3. Footprinting through Social Networking Sites
Concept: Social networking sites contain vast amounts of personal and organizational information, which attackers can gather either by browsing public profiles or by creating fake profiles to lure victims.
Actions & Tools:
- People Search on Social Networking Sites:
- Search for people by name, keyword, company, school, friends, colleagues, and location on sites like Facebook, Twitter, LinkedIn, and Instagram.
- Obtain personal (name, position, location, education) and professional (company, phone, email, photos, videos) information.
- Gathering Information from LinkedIn:
- LinkedIn is a professional social networking site with personal information such as name, position, organization, location, and educational qualifications.
- Tools:
- theHarvester (https://github.com): Tool for open-source intelligence gathering, can enumerate LinkedIn to find employees and job titles (e.g., theHarvester -d microsoft -l 200 -b linkedin).
- Harvesting Email Lists:
- Collect publicly available email addresses of target organization employees to perform social engineering and brute-force attacks.
- Tools:
- theHarvester (https://github.com): Extract email addresses from specified domains using search engines like Baidu, Google, Bing, Yahoo (e.g., theHarvester -d microsoft.com -l 200 -b baidu).
- Email Spider.
- AI-powered tools (ChatGPT/ShellGPT): Automate email harvesting using prompts (e.g., “Use theHarvester to gather email accounts associated with ‘microsoft.com, limiting results to 200, and leveraging ‘baidu’ as a data source”).
- Analyzing Target Social Media Presence:
- Discover most shared content using hashtags or keywords, track accounts and URLs, and obtain email addresses. This information helps in phishing and social engineering.
- Tools:
- BuzzSumo (https://buzzsumo.com): Finds the most shared content for a topic, author, or domain across major social networks (Twitter, Facebook, LinkedIn, Google Plus, Pinterest).
- Google Trends.
- Hashatit, Ubersuggest.
- General Social Networking Footprinting Tools:
- Gather sensitive information like date of birth, educational qualification, employment status, relatives’ names, business strategy, potential clients, and upcoming project plans.
- Tools:
- Sherlock (https://github.com): Searches a vast number of social networking sites for a target username, providing complete URLs to profiles.
- Social Searcher (https://www.social-searcher.com): Searches for content on social networks in real-time, providing deep analytics data, URLs to profiles, and postings.
- AI-powered tools (ChatGPT/ShellGPT): Use Sherlock to gather personal information (e.g., “Use Sherlock to gather personal information about Sundar Pichai and save the result in recon2.txt”).
4. Whois Footprinting
Concept: Gathers network-related information from Whois databases, which store details about domain owners, registrars, registration dates, name servers, and contact information.
Actions & Tools:
- Perform Whois Lookup:
- Query Whois databases maintained by Regional Internet Registries (RIRs) or Whois services.
- Information obtained: Domain name details, registrar, owner contact details (if not private), name servers, NetRange, creation/expiry/last updated dates, domain status, and IP address information. This information assists in social engineering and mapping the target network.
- Regional Internet Registries (RIRs):
- ARIN (https://www.arin.net): American Registry for Internet Numbers (North America, parts of Caribbean).
- AFRINIC (https://www.afrinic.net): African Network Information Center.
- APNIC (https://www.apnic.net): Asia Pacific Network Information Center.
- RIPE (https://www.ripe.net): Reseaux IP Europeens Network Coordination Centre (Europe, Middle East, Central Asia).
- LACNIC (https://www.lacnic.net): Latin American and Caribbean Network Information Center.
- Tools:
- whois.domaintools.com.
- who.is.
- Batch IP Converter (http://www.sobsoft.com): Provides information about IP addresses, hostnames, or domains (country, state, city, phone, fax, network provider, admin/tech support contacts).
- WHOIS Domain Lookup, Active Whois.
- Finding IP Geolocation Information:
- Obtain information like country, region/state, city, ZIP/postal code, time zone, connection speed, ISP, domain name, IDD country code, area code, mobile carrier, and elevation.
- This information helps in social engineering attacks (spamming, phishing), setting up compromised web servers, or designing malware for specific areas.
- Tools:
- IP2Location (https://www.ip2location.com): Identifies a visitor’s geographical location using IP address lookup database.
- IP Location Finder, IP Address Geographical Location Finder.
5. DNS Footprinting
Concept: Gathers information about DNS servers, DNS records, and server types used by the target organization to identify hosts and exploit the network.
Actions & Tools:
- Extracting DNS Information:
- DNS footprinting reveals DNS zone data, including domain names, computer names, and IP addresses, which can identify key hosts for social engineering.
- DNS Record Types:
- A: Points to a host’s IP address.
- AAAA: Points to a host’s IPv6 address.
- MX: Points to a domain’s mail server.
- NS: Points to a host’s name server.
- CNAME: Canonical naming allows aliases to a host.
- SOA: Indicates authority for a domain.
- SRV: Service records.
- PTR: Maps IP address to a hostname (important for Active Directory/domain controllers).
- RP: Responsible person.
- HINFO: Host information record (CPU type, OS).
- TXT: Unstructured text records.
- DNS Interrogation Tools: Extract IP ranges and DNS information, especially if zone data transfer is allowed.
- SecurityTrails (https://securitytrails.com): Creates a DNS map, enumerates current and historical DNS records (A, AAAA, NS, MX, SOA, TXT), and brute-forces subdomains.
- Fierce (https://github.com): DNS reconnaissance tool for scanning and collecting information, enumerating subdomains, and identifying non-contiguous IP spaces and hostnames.
- Basic scan: fierce –domain certifiedhacker.com.
- Specific subdomain scan: fierce -domain certifiedhacker.com -subdomains write admin mail.
- Scan domains near discovered records: fierce -domain certifiedhacker.com -subdomains mail -traverse 10.
- Attempt HTTP connection on discovered domains: fierce –domain certifiedhacker.com –subdomains mail –connect.
- Full detailed scan: fierce –domain certifiedhacker.com –wide.
- DNSChecker, zdns, DNSdumpster.com.
- AI-powered tools (ChatGPT/ShellGPT): Automate DNS enumeration (e.g., “Install and use DNSRecon to perform DNS enumeration on the target domain www.certifiedhacker.com”).
- dnsrecon command: sudo apt-get update && sudo apt-get install -y dnsrecon && dnsrecon -d certifiedhacker.com -t std.
- Reverse DNS Lookup:
- Obtain the domain name of a given IP address or IP range by locating a DNS PTR record.
- Tools:
- DNSRecon (https://github.com): Perform reverse DNS lookup on an IP range by brute force (e.g., dnsrecon -r 162.241.216.0-162.241.216.255).
- Reverse Lookup (https://mxtoolbox.com – MXToolbox is a very good tool for DNS, email, and IP checks).
- puredns, Reverse IP Domain Check, Reverse IP Lookup.
6. Network and Email Footprinting
Concept: After DNS information, gather network-related details and track email communications to understand network structure and potential vulnerabilities.
Actions & Tools:
- Locate the Network Range:
- Determine the network range of the target system using information about the organization (what it does, who works there).
- Obtain IP allocation details from Regional Registry databases (e.g., ARIN Whois database search tool via https://www.arin.net/about/welcome/region).
- Identify private IP address blocks (10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16).
- Identify network topology, access control devices, and OS used.
- Traceroute Analysis:
- Trace the path (route) through which target host packets travel in the network.
- Traceroute uses ICMP protocol and Time to Live (TTL) field of the IP header to identify routers, round-trip time, router names, and network affiliation.
- Types:
- ICMP Traceroute: Default in Windows (using tracert command, e.g., tracert 216.239.36.10). Often blocked by network devices.
- TCP Traceroute: Used when ICMP is blocked (using tcptraceroute command in Linux, e.g., sudo tcptraceroute www.google.com).
- UDP Traceroute: Also used when ICMP is blocked (using traceroute command in Linux, e.g., traceroute www.google.com).
- Analyze results to identify intermediate devices/hosts (routers, firewalls) in the path to the target network.
- Tools:
- NetScanTools Pro (https://www.netscontools.com): Offers ICMP, UDP, or TCP traceroute methods, identifies intermediate devices and country for each IPv4 address in a hop.
- PingPlotter (https://www.pingplotter.com): Collects traceroute data (ICMP, UDP, TCP), discovers network hops, tracks latency and packet loss, visualizes data in graphs, and aids in identifying bandwidth bottlenecks, WiFi interference, or hardware faults.
- Traceroute NG, tracert (Windows), tcptraceroute (Linux), traceroute (Linux).
- AI-powered tools (ChatGPT/ShellGPT): Automate tracerouting (e.g., “Perform network tracerouting to discover the routers on the path to a target host www.certifiedhacker.com”).
- Tracking Email Communications:
- Monitor email delivery, revealing time/date of receipt and opening.
- Gather recipient’s system IP address, geolocation, email received/read notification, read duration, proxy detection, link clicks, OS and browser information, email forwarding, device type, and path traveled.
- This information helps build hacking strategies and perform social engineering/other attacks.
- Email Header Analysis: Email headers contain sender details, routing info, addressing, date, subject, recipient, and unique message IDs. They are crucial for tracing the email path.
- Information in header: Sender’s mail server, date/time of receipt by originator’s server, authentication system used, date/time of sending, unique message ID, sender’s full name, sender’s IP address, and address from which message was sent.
- Email Tracking Tools:
- IP2LOCATION’s Email Header Tracer (https://www.ip2location.com): Analyzes and traces email paths using IP addresses in the header to identify target location and mail servers.
- MxToolbox.
- eMailTrackerPro (http://www.emailtrackerpro.com): Analyzes email headers for sender’s geographical location, IP address, and allows saving past traces.
- DNS Checker Email Header Analyzer, Social Catfish, Holehe.
7. Footprinting through Social Engineering
Concept: A non-technical process of exploiting human behavior to extract confidential information. Attackers gain confidence and mislead users into revealing sensitive data for malicious purposes (unauthorized access, identity theft, fraud, etc.).
Actions & Techniques:
- Collecting Information through Social Engineering on Social Networking Sites:
- Browse public profiles or create fake profiles to lure employees into revealing sensitive information.
- Information available: Date of birth, educational info, employment background, spouse’s names, potential partners, websites, upcoming company news, contact info, friends lists, family identity, interests, activities from shared photos/videos/groups/events.
- Eavesdropping: Unauthorized listening of conversations or reading of messages (audio, video, text, fax, instant messaging).
- Shoulder Surfing: Secretly observing the target to gather critical information like passwords, PINs, account numbers, and credit card information, often in crowded places.
- Dumpster Diving (Trashing): Rummaging through garbage bins for information such as phone bills, contact information, financial information, operations data, source codes, sticky notes, or ATM trash receipts.
- Impersonation: Pretending to be a legitimate or authorized person (e.g., courier, janitor, technician, visitor) to mislead targets into revealing information or gain access to physical locations to scan terminals, search desks, or overhear conversations.
8. Automate Footprinting Tasks using Advanced Tools and AI
Concept: Various tools and AI-powered technologies can facilitate and automate information gathering tasks, increasing efficiency and scope of investigations.
Tools:
- Maltego (https://www.maltego.com): Automated tool to determine relationships and real-world links between people, groups, organizations, websites, Internet infrastructure, and documents.
- Recon-ng (https://github.com): Web reconnaissance framework with independent modules for database interaction, used to extract lists of hosts associated with a target URL.
- FOCA (Fingerprinting Organizations with Collected Archives) (https://www.elevenpaths.com): Finds metadata and hidden information in documents (Microsoft Office, Open Office, PDF), performs web/DNS/IP searches, PTR scanning, Bing IP searches, and dictionary attacks against DNS.
- subfinder (https://github.com): Subdomain discovery tool that finds valid subdomains for websites using passive online sources and supports multiple output formats.
- OSINT Framework (https://osintframework.com): Open-source intelligence gathering framework focusing on free tools/resources, presented as an OSINT tree structure.
- Recon-Dog (https://www.github.com): All-in-one tool for basic information gathering (Censys, NS lookup, Port scan, Detect CMS, Whois lookup, Detect honeypot, Find subdomains, Reverse IP lookup, Detect technologies, All).
- BillCipher (https://www.github.com): Information gathering tool for websites/IP addresses with options like DNS lookup, Whois lookup, port scanning, zone transfer, host finder, reverse IP lookup, email gathering, subdomain listing, admin login site finder, CloudFlare bypass, website copier, and host info scanner.
- Additional Tools: Sudomy (https://github.com), theHarvester (https://www.edge-security.com), whatweb (https://github.com), Raccoon (https://github.com), Orb (https://github.com), Web Check (https://web-check.xyz), OSINT.SH (https://osint.sh).
AI-Powered OSINT Tools:
- Taranis AI (https://taranis.ai): Leverages AI and NLP to gather, analyze, and interpret publicly available data from websites (unstructured news articles), identifying security threats and vulnerabilities.
- OSS Insight (https://ossinsight.io): Uses AI to provide in-depth insights into the GitHub ecosystem by analyzing GitHub events, offering tools for repository analytics, developer productivity, technical fields analytics, and project comparison.
- DorkGPT (https://dorkgpt.com): AI-powered tool to assist Google Dorking, generating and refining search queries to uncover sensitive or hidden information.
- DorkGenius (https://dorkgenius.com): Automates Google Dorking to generate advanced search queries for hidden files, directories, sensitive information, and vulnerabilities.
- Google Word Sniper (https://googlewordsniper.eu): Refines search queries for more effective Google results by identifying targeted keywords and phrases.
- Cylect.io (https://cylect.io): Advanced AI-powered OSINT tool integrating multiple databases into a user-friendly interface for efficient data collection.
- ChatPDF (https://chatpdf.com): Leverages AI to analyze and extract information from PDF documents through a conversational interface.
- Bardeen.ai (https://www.bardeen.ai): Automation tool for OSINT, streamlining data collection and analysis from various online sources.
- DarkGPT (https://github.com/luijait/DorkGPT): AI assistant using GPT-4-200K to query leaked databases for vital information.
- PenLink Cobwebs (https://cobwebs.com): Advanced AI-powered OSINT tool specializing in gathering and analyzing data from various online sources for cybersecurity investigations.
- Explore AI (https://exploreai.vercel.app): AI-powered YouTube search engine for extracting information from YouTube videos.
- AnyPicker (https://opp.onypicker.com): Visual web scraper and AI OSINT tool for extracting data from websites without coding, supporting multiple pages and real-time previews.
- Create and Run Custom Python Script with AI: Use AI (e.g., ChatGPT) to develop custom Python scripts to automate various footprinting tasks (e.g., DNS lookups, WHOIS records retrieval, email enumeration).
- Example script functions: dns_lookup(), whois_lookup(), email_enumeration().