Phase1: Reconnaissance

2008 Oct 18


Low Tech Whois Databases
Social Engineering DNS Reconnaissance & Defense
Web Search General Reconnaissance Tools
Usenet Web Based Reconnaissance Tools

Low Tech: Social Engineering, Break-In, & Dumpster Diving

These low-tech techniques can possibly learn passwords, learn about network architecture, get system documentation, and even highly confidential information.

Social Engineering

Calling an employee at target organizationon the phone and tricking the individual to revealing sensitive information. This can be done by pretending to be another employee, a customer, or supplier. A pretext is used such as being a new employee, administrative assistant, manager or system administrator. Such call can try to get a contact name and number, a sensitive document, or even a password. Examples include: an angry manager calling help desk because their password stopped working, a system administrator needing a user's password to fix their account, a sales person in field needing contact information, getting a voice mail account inside organization (others will trust such a number to leave info).

Physical breakin-in can give access to to much, such as: access to internal net (CAT5 plug or wireless) inside firewall, finding a computer already logged into, sensitive trash and dumpster diving, unlocked file cabinets, removing a hard drive or whole computer. Use a shredder!

Web Search

Public domain information on the web can include: domain names, network addresses, contact information (names, phone numbers, email), finding dial-in modems, clues about the corporate culture and language, product offerings, work locations, business partners, recent mergers and acquisitions, technologies in use (e.e. Win NT, Oracle database), and much more.

Search engines can find historical information about an organization, and competitors, products, employees, business partners, technologies, current history, and financial status. By searching (e.g. on www.altavista.com) for "link:www.company.com" all web sites that link to the target web site (e.g. vendors and business partners).

Be sure your web site(s) do not reveal what products you use in your environment and their configuration.

Usenet Newsgroups

Many times eployess wil lanswer detailed quetions here revealing sensitive information on a large scale. Sometimes an employee will ask a detailed question to technical newsgroups about how to configure a particular type of system or troubleshoot a problem. An attacker could send a response with wrong advice which would lower the security of the system. Use the Google newsgroup Web search engine at groups.google.com (which is the acquired DejaNews Web site).

Employess must be trained to not reveal sensitive information on usenet. Make usenet searches to verify this has been done.

Whois Databases

The Internet Corporation for Assigned Names and Numbers (ICANN) has an accreditation process for name/number/DNS registrars (such as Network Solutions).

This information is useful to notify someone if their systems are being compromised and used to attack you.

Whois databases
Type Type
Value
Sites or Meaning
Registrars accredited www.internic.net/alpha.html
Domain .com
.net
.org
InterNIC whois database
Domain .edu www.networksolutions.com
Domain .gov whois.nic.gov
Domain .mil whois.nic.mil
Domain country codes Allwhois
Misc NIC Handle
Name
Company Name
Host or Nameserver name
Network Solutions
IP Address In North and
South America,
Caribbean, Africa
ARIN : American Registry for Internet Numbers
Network Solutions
In Europe RIPE NCC : Reseaxus IP Europeens Network Coordination Centre
In Asia APNIC : Asia Pacific Network Information Center
DNS
Records
Address
(A record)
Maps a domain name to an IP address
Host Information
(HINFO record)
Identifies associated host system type (e.g. Solaris8)
Mail Exchange
(MX record)
Identifies mail system accepting mail for domain
Name Server
(NS record)
Identifies DNS servers for domain
Text
(TXT record)
Associates an arbitrray text string with domain

DNS Reconnaissance

Once a DNS server is known it can be queried using nslookup a program found in Windows NT/2000 and Unix/Linux. First step is a zone transfer, which aks the name server to send all information it has about a domain.

nslookup
> server [target_DNS_server name or IP] specify DNS server
> set type=any look for any records
> ls -d [target_domain] requests information

Other DNS reconnaissance tools include:

DNS Reconnaissance Defense

p>Do not put unnecessary information useful to an attacker such as server names, or operating system type, or CPU type. The common DNS serevr SW, BIND, has the allow-tranfer and xfernets directives which specfy the IP addresses and networks from which zone tranfers are allowed. You can also configure your firewall or external router with filtering rules to allow access to TCP port 53 only to those servers that act as back-ups for your DNS server. UDP port 53 is used for DNS queries and responses and must be not disabled. Also split the DNS servers to one which is for external use only and one for the larger internal use. This is called a Split-Brain or Split-Horizon DNS.




General Reconnaissance Tools

A freeware suite called Sam Spade written by Steve Atkins runs on Windows 9x, NT, and 2000 has the following tools available via a GUI:

Tool Functionality
Ping Sends and ICMP Echo Request message to a host to see how fast or if it will respond
Whois Conducts whois lookups uding default whois servers, or by allowing user to specify which whois database to use.
IP Block
Whois
Determines who owns a particular set of iP address using ARIN databases.
Nslookup Queries a DNS server to find domain name to IP address mapping.
Dig For getting detailed DNS info about a system.
DNS Zone
Transfer
Transfers all information about a domain from prper server.
Tracerout Returns a list of router hops between the source machine and destination.
Finger Queries a system to determine its user list.
SMTP VRFY Determines whether a particular email is valid at a given email server (based on SMTP).
Web Browser A mini Web browser lets the user view raw HTTP interactions.

Downloads
Suite System Cost
Sam Spade Windows Freeware
CyberKit Windows Freeware
NetScan Windows $25
iNetTools Windows
Mac
$???

Web Based Reconnaissance Tools

Beware of of having your IP address available to sites like above!

2005-2008