So in order to understand what the main areas where organisation should be aware of securing data, we should understand the terminologies like footprinting, scanning and enumeration

Authors Avatar
Introduction to assignment:

This assignment is about exploring some of the network security issues in organisations. The information and data about any organisation is very important for them to be protect from outside real and cyber world. The information should be kept according to the standards of security so that it can be protected from hackers.

So in order to understand what the main areas where organisation should be aware of securing data, we should understand the terminologies like footprinting, scanning and enumeration. These three terminologies can be called as three steps for hackers to explore the secrete information of an organisation. In this assignment we will get the basic understand of footprinting i.e. gathering information about organization's network, scanning ports and enumeration, the actual process of gaining information access of an organization.

We will take 5 internet organizations and will test there networks via different softwares like Nmap, Nbrute, Sam Spade and many others. During testing we will follow a procedure which identifies the internal components of the examined websites from its webpages that are open to public using techniques like WHOIS, DNS, Interrogations and others. Also getting the range of IP addresses of network of that organization and the host machines that are active within an organisation.

After getting the understandings of all the issues, we will suggest some hacking preventative measures, which can be used to protect the attack against footprinting, scanning and enumeration.

At the end we will draw conclusions about the security of the scrutinised organizations.

What is Hacking?

(http://www.bookrags.com/sciences/computerscience [accessed 15 November 2005])

For years, "hacker" was a positive term that described computer enthusiasts who had a zeal for computer programming. Those who hacked took pride in their ability to write computer programs that stretched the capabilities of computer systems and find clever solutions to seemingly impossible problems. Although many computer enthusiasts still ascribe to this definition, the everyday usage of the word has changed significantly. Today, "hacking" generally refers to individuals who break into computer systems or use their programming skills or expert knowledge to act maliciously. (Traditional hackers-the good kind-prefer to use the term "cracker" to refer to these individuals.)

Some of the most common types of hacking include:

* Breaking into computer networks;

* Bypassing passwords or copy protection in computer software;

* Defacing and/or damaging Internet web sites;

* Causing a denial of service attack on a web site or network (preventing legitimate users from accessing a web site);

* Stealing valuable information such as passwords and credit card data.

A Systematic Process

Although portrayed otherwise in Hollywood films and in television shows, hacking is a systematic, tiresome process in which the attacker attempts methodically to locate computer systems, identify their vulnerabilities, and then compromise those vulnerabilities to obtain access. Experts have identified six steps that are generally followed in the hacking process. These include (1) footprinting (reconnaissance); (2) scanning; (3) enumeration; (4) penetration; (5) advance; and (6) covering tracks.

Footprinting

The first technique often used by hackers is called footprinting. The objective is to gather information essential to an attack and enable an attacker to obtain a complete profile of an organization's security posture. During this phase, the hacker might gain information about the location of the company, phone numbers, employee names, security policies, and the overall layout of the target network. Often, hackers can perform this work with a simple web browser, a telephone, and a search engine. Unfortunately, humans are often the weakest security link in a corporation. A clever phone call to the technical support department can often compromise critical information: "Hi-this is Bill and I forgot my password. Can you remind me what it is?"

Footprinting contains researching the target website's specific qualities such as open ports, services, security feature, and any other information you can get out of the machine on the network.

Internet Footprinting:

"Systematic collection of information on an intended target with the goal to create a complete profile of the organization's security posture, system & Security Administrators info."

(http://www.2600slc.org [accessed 15 November 2005])

"Footprinting is the first and most convenient way that hackers use to gather information about computer systems and the companies they belong to. The purpose of footprinting to learn as much as you can about a system, it's remote access capabilities, its ports and services, and the aspects of its security."

Its, just like knowing about your enemy before you try to attack. A successful attacker must harvest a wealth of information to execute a focused and surgical attack. This enables an attacker to create a complete profile of an organization's security posture and this is achieved by using a combination of tools and techniques.

"Footprinting is the process of accumulating data regarding a specific network environment, usually for the purpose of finding ways to intrude into the environment. Footprinting can reveal system vulnerabilities and improve the ease with which they can be exploited." (http://searchsecurity.techtarget.com/home/0,289692,sid14,00.html [accessed 15 November 2005])

Why is footprinting necessary?

Footprinting is necessary to systematically and methodically ensure that all pieces of in-formation related to the aforementioned technologies are identified. Without a sound methodology for performing this type of reconnaissance, you are likely to miss key pieces of information related to a specific technology or organization. Footprinting is often the most arduous task of trying to determine the security posture of an entity; however, it is

one of the most important. Footprinting must be performed accurately and in a controlled fashion. (McClure.S et al, 2001)

Explanation:

In order to perform a successful hack on a system, it is best to know as much as you can, if not everything. Most companies are now hiring hackers to protect their systems since footprinting can be used to attack a system, it can also be used to protect it.

Open Source Footprinting is the easiest and safest way to go about finding information about a company. Information that is available to the public, such as phone numbers, addresses, etc. Performing whois requests, searching through DNS tables, and scanning certain IP addresses for open ports, are other forms of open source footprinting. Most of this information is fairly easy to get, and getting it is legal, legal is always good.

Most organizations post a load of information about themselves on their website and this information can be very useful to hackers and the companies don't even realize it. (http://www.2600slc.org [accessed 15 November 2005])

Steps for gathering information:

Step 1: Determine the scope of footprinting activities

Basic ways:

) HTML COMMENTS:

The other easier way of getting information about an organization is to view through its HTML source code by opening the website and in the view menu select view source. In HTML code you find comments which programmers write to make the code understandable for themselves because later on these comments make the code understandable if the want some changes in code. So during writing comments in HTML code the provide some very important information about the company such as companies phone numbers, addresses and some other information regarding their employers and there internal departments. So comments in HTML code are the equivalent to the small captions under the pictures in high school science books.

2) FORM GET/POST METHODS:

Another way of getting information is also related with HTML code. In HTML FORMS we have 2 methods of sending information to the server for authentication. One is via FORM GET method and another is FORM POST method. If we want to send the information via HTTP securely to the server than we should use HTML POST Method. On the other hand if don't need to send data securely, for example in search engines we send query word to phrase for searching websites ,images or files. In this case the data reaches the server as a part of HTTP URL.

e.g http://www.google.co.uk/search?q=footprinting

So from URL we can get the information is that search is made for footprinting. In the same way some programmer use POST method for submitting the forms that contains some sensitive information about the user like their data of birth, address, credit card numbers and sometimes their passwords. So attackers can gain information from the URLs.

3) Searching via USENET:

Use USENET for messages and other important information via emails, related to @email.com sometimes reveals very useful information. For example we can saw a posting from Company System Administrator's work account which relates to some new system. He may say that this system or switch is new to him and he don't know how to turn off the default accounts and passwords. So hackers can gain a lot many information by reviewing such postings.

4) Via Search Engines:

We can use the advanced searching capabilities of some of the major search engines such as Google, Netscape, Altavista, AskJeves, Yahoo etc. These search engines gives you a lot information about the all the links of a company's website and all links that have look back to this website.

Other Ways:

On other side for getting technical information about the website of company, may include learning the Internet technologies being used; the operating system and hardware being used; getting some information from the target TCP, and UDP services, specific IP addresses, some of the access methods ACL's etc. user names, groups, identify intrusion detection systems (IDS), banners, routing tables, SNMP info, system architecture info (OS info) domain names, and more.

) Databases:

EDGAR, Switchboard.com, Credit Bureau, Social Security, Voting, Financial, Vital Statistics, Registrar

2) Software tools:

Nmap, Nbrute, Sam Spade, Superscan, Visualroute

Step 2: Network Enumeration:

In this step, attackers try to find out the domain names and associated networks related to the target organisation. There are many databases that provide this kind of information, such as the InterNIC database (run by Network Solutions - http://www.networksolutions.com), the American Registry for Internet Numbers (ARIN - http://www.arin.net) and whois databases (for example, http://whois.ripe.net and http://whois.nic.gov).

(http://www.dirc.org.uk/publications/techreports/papers/5.pdf. [accessed 15 November 2005])

The process is performing various queries on the many whois databases found on the internet. The result is the hacker now having the information needed to attack the system they are learning about. Companie's domain names are listed with registrars, and the hacker would simply query the registrar to obtain the information they are looking for. The hacker simply needs to know which registrar the company is listed with.

There are five types of queries which are as follows:

) Registrar Query:

This query gives information on potential domains matching the target. Domain information of an organization is stored with a registrar. By using the whois command on linux we can query the registrar for different information.

For example to query the server whois.crsnic.net for all occurrences of the domain starting with word "Netscape"

[root@localhost root]# whois "netscape."@whois.crsnic.net

[whois.crsnic.net]

Whois Server Version 1.3

Domain names in the .com and .net domains can now be registered

with many different competing registrars. Go to http://www.internic.net

for detailed information.

Aborting search 20 records found .....

NETSCAPE-REWARDS.NET

NETSCAPE-REWARDS.COM

NETSCAPE-REGISTER.COM

NETSCAPE-POKER.NET

NETSCAPE-POKER.COM

NETSCAPE-ONLINE.NET

NETSCAPE-ONLINE.COM

NETSCAPE-NAVIGATORS.COM

NETSCAPE-NAVIGATOR.COM

NETSCAPE-NAVIGATER.COM

NETSCAPE-MICROSOFT.COM

We can focus more on a particular domain to reveal its correct registrar.

[root@localhost root]# whois "netscape.net"@whois.crsnic.net

[whois.crsnic.net]

Whois Server Version 1.3

Domain names in the .com and .net domains can now be registered

with many different competing registrars. Go to http://www.internic.net

for detailed information.

Domain Name: NETSCAPE.NET

Registrar: AMERICA ONLINE, INC. DBA AOL AND/OR COMPUSERVE-AOL

Whois Server: whois.registrar.aol.com

Referral URL: http://www.registrar.aol.com

Name Server: NS.NETSCAPE.COM

Name Server: NS2.NETSCAPE.COM

Name Server: NS1.NETSCAPE.COM

Status: REGISTRAR-LOCK

Updated Date: 29-dec-2002

Creation Date: 30-dec-1997

Expiration Date: 29-dec-2003

Organizational Query

After coming to know the registrar for a particular domain, we can query that registrar for all instances of the entity name.

2) Domain Query:

A domain query is based off of results found in an organizational query. Using a domain query, you could find the company's address, domain name, administrator and his/her phone number, and the system's domain servers. The administrative contact could be very useful to a hacker as it provides a purpose for a wardialer. Administrators now post false phone numbers to protect themselves from this.

Domain query give information about:

* The registrant

* The domain name

* The administrative contact

* When the record was created and updated

* The domain name sustem servers (DNSes)

Now we will search for the domain in its whois server.

[root@ns2 root]# whois [email protected]

Domain Name: NETSCAPE.NET

Registrant:

Netscape Communications Corp.

501 East Middlefield Rd

Mountain View, CA 94043

US

Created on..............: Dec 30 1997 12:00AM

Expires on..............: Dec 29 2003 12:00AM

Record Last Updated on..: Feb 12 2003 4:39PM

Registrar...............: America Online, Inc.

http://whois.registrar.aol.com/whois/

Administrative, Technical Contact:

Netscape Domain Support (Netscape Communications Corp.)

501 East Middlefield Rd

Mountain View, CA 94043

US

Tel. 650 937 3216

Email: [email protected]

Domain servers:

NS.NETSCAPE.COM

98.95.251.10

NS1.NETSCAPE.COM

49.174.213.7

NS2.NETSCAPE.COM

207.200.73.80

WHOIS data is only provided by this server for domains ending

in .COM, .NET, and .ORG that were registered through

America Online, Inc's Domain Registration Service.

This type of query will provide you the registrant information, domain name, administrative contact , when the record was created and updated and the primary and secondary DNS servers.

3) Organizational Query:

Display all information related to a particular organization. Perform a"whois" on target organization: $ whois "Target Organization".

4) Network Query: The fourth method one could use the American Registry for Internet Numbers is to discover certain blocks owned by a company. It's good to use a broad search here, as well as in the registrar query.

The American Registry of Internet Numbers (ARIN) is another database to determines networks associated with a target domain.

For e.g.

[root@ns2 root]# whois "Netscape"@whois.arin.net

[whois.arin.net]

Netscape (NETSCA-8)

Netscape (NETSCA-1)

Netscape Communications (NETSCA)

Netscape Communications Corp. (NSCP)

Netscape Communications Corp. (AS6992) NETSCAPE-AS 6992

Netscape Communications NETSCAPE186 (NET-204-29-186-0-1) 204.29.186.0 - 204.29.187.255

Netscape Communications Corp. NETSCAPE157 (NET-198-178-157-0-1) 198.178.157.0 - 198.178.157.255

Netscape Communications Corp. NETSCAPE (NET-206-222-224-0-1)

# ARIN WHOIS database, last updated 2003-04-04 20:00

# Enter ? for additional hints on searching ARIN's WHOIS database.

One can also search upon a particular net block

[root@linux root]# whois [email protected]

[whois.arin.net]

OrgName: Netscape Communications

OrgID: NETSCA

Address: 501 E. Middlefield

City: Mountain View

StateProv: CA

PostalCode: 94043

Country: US

NetRange: 204.29.186.0 - 204.29.187.255

CIDR: 204.29.186.0/23

NetName: NETSCAPE186

NetHandle: NET-204-29-186-0-1

NetType: Direct Assignment

NameServer: NS.NETSCAPE.COM

NameServer: NS.CW.NET

Comment: be invalid. ARIN has attempted to obtain updated data, but has

Comment: been unsuccessful. To provide current contact information,

Comment: please email [email protected].

Updated: 2002-10-08

TechHandle: WF32-ARIN

TechName: Foss, William

TechPhone: +1-415-528-2604

TechEmail: [email protected]

# ARIN WHOIS database, last updated 2003-04-17 20:10

# Enter ? for additional hints on searching ARIN's WHOIS database.

[root@linux root]#

5) POC Point of Contact Information (Contact Information, Group Contact Information)

Information on the POC of IP address space or ASNs registered in JPNIC WHOIS to use in case of a network problem. The POC can be an individual (Contact Information) or a group (Group Information). There are technical and administrative contacts.

POC Query finds the many IP adresses a machine may have. The administrative contact may be the administrative contact for multiple organizations,so perform a POC query. You may uncover a domain that you were unaware of.

Step 3: DNS Interrogation

A serious misconfigiration by a DNS Administrator is to allow untrusted Internet users to allow DNS zone transfers.

Zone Transfer

The zone transfer is the method a secondary DNS server uses to update its information from the primary DNS server. It asks a name server for the entire contents of a Zone. Cached records are never reported in a zone transfer. Zone transfers are usually used by secondary servers to update its own zone data from its primary server.

Many DNS servers are misconfigured and provide a copy of the zone to anyone who asks. A such organizations which do not use a public /private DNS mechanism to segregate their external DNS information from its internal, private DNS information can easily disclose their internal hostnames and IP information to an attacker.

To perform a zone transfer use the nslookup client which comes with most UNIX and NT servers.

By default nslookup will show the default name server to which it will query , we will change this and set it to the name server we got for Netscape

C:\>nslookup

Default Server: corpregid.eth.net

Address: 202.9.152.11

> server 198.95.251.10

Default Server: ns.netscape.com

Address: 198.95.251.10

> set type=any

> netscape.com

Server: ns.netscape.com

Address: 198.95.251.10

netscape.com

primary name server = ns.netscape.com

responsible mail addr = dnsmaster.netscape.com

serial = 2003041600

refresh = 3600 (1 hour)

expire = 604800 (7 days)

default TTL = 600 (10 mins)

netscape.com nameserver = ns1.netscape.com

netscape.com nameserver = ns.netscape.com

netscape.com internet address = 64.12.180.19

netscape.com MX preference = 20, mail exchanger = xwing.aoltw.net

ns.netscape.com internet address = 198.95.251.10

>

DNS Security:

The Domain Name System (DNS) is vital to the Internet, providing a mechanism for resolving host names into Internet Protocol (IP) addresses. Insecure underlying protocols and lack of authentication and integrity checking of the information within the DNS threaten the proper functionality of the DNS. The Internet Engineering Task Force (IETF) is working on DNS security extensions to increase security within the DNS, known as DNSSEC. These security issues and solutions are presented in this paper.
Join now!


The threats that surround the DNS are due in part to the lack of authenticity and integrity checking of the data held within the DNS and in part to other protocols that use host names as an access control mechanism. In response to this, the IETF formed a working group to add DNS Security (DNSSEC) extensions to the existing DNS protocol.

Step 4: Network Reconnaissance

Now that the potential target within the system has been identified, the attacker can try to map the target's network topology and identify potential access paths to that network. This ...

This is a preview of the whole essay