SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Information Gathering
Prepared By : Mr. Abhijeet A. More
OWNER OF PERFECT TRAINING CENTER
Information Gathering
Information Gathering
 Information gathering refers to gathering information

about the issue you‟re facing and the ways other
organizations and communities have addressed it

 You can gather information using both existing sources

and natural examples
Information Gathering
 Synthesis here refers to analyzing what you‟ve learned

from your information gathering, and constructing a
coherent program or approach by taking ideas from a
number of sources and putting them together to create
something that meets the needs of the community and
population you‟re working with
 Synthesis involves extracting the functional elements of
both the analysis of the issue and approaches to it
 Functional elements are those that are indispensable either
to understanding the issue, or to implementing a particular
program
Why gather information?
 It will help you avoid reinventing the wheel.
 It will help you to gain a deep understanding of the issue






so that you can address it properly.
You need all the tools possible to create the best program
you can.
It‟s likely that most solutions aren‟t one size fits all.
It can help you ensure your program is culturally sensitive.
Knowing what‟s been done in a variety of other
circumstances and understanding the issue from a number
of different viewpoints may give you new insights and new
ideas for your program.
Information Gathering Tools
Maltego
www.paterva.com
Maltego is an intelligence and forensics application. It
allows for the mining and gathering of information as well
as the representation of this information in a meaningful
way.
What is Maltego?
 Maltego is a unique platform developed to deliver a clear

threat picture to the environment that an organization
owns and operates

 Maltego‟s unique advantage is to demonstrate the

complexity and severity of single points of failure as well as
trust relationships that exist currently within the scope of
your infrastructure
About Maltego
 Maltego is an intelligence and forensics application. It

allows for the mining and gathering of information as well
as the representation of this information in a meaningful
way.
 Coupled with its graphing libraries Maltego allows us to
identify previously unknown relationships between
information, persons and information about persons.
 As such, it is a useful tool in the IT security field to map an
organization's people and relationships. A valuable aid in
exploring the social-engineering attack vector in pentesting investigations.
Tools
 Nmap (Network Mapper) is a security scanner originally

written by Gordon Lyonused to discover hosts and services on
a computer network, thus creating a "map" of the network. To
accomplish its goal, Nmap sends specially crafted packets to
the target host and then analyzes the responses, etc.
NMAP
NMAP Objective
 Find open TCP and/or UDP listeners on a single or range of

TCP/IP Addresses

 Find out software versions
 Find out operating system type
 Don‟t get caught doing it
 Learn what you have on your network
Is Nmap the best tool?
 Yes it is
 Long history of development and support

 Active user base, used in many products
 Continuous development and improvements
 “Industry Standard” port scanner
 It‟s free, open and well documented.
 Stay current! (4.00 as of this doc)
History of Nmap
 First released September 1, 1997 in Phrack 51 “The Art of









Portscanning”
http://www.insecure.org/nmap/p51-11.txt
Many updates since then:
OS Detection (Phrack 54)
Idle scanning
Version scanning
ARP Scanning
Host Discovery
 TCP SYN Probe (-PS<portlist>)
 TCP ACK Probe (-PA<portlist>)

 UDP Probe (-PU<portlist>)
 ICMP Echo Request/Ping (-PE)
 ICMP Timestamp Requset (-PP)
 ICMP Netmask Request (-PM)
 ARP Probes (-PR)
Most valuable TCP „ping‟ Ports?

 80 (HTTP)
 25 (SMTP)
 22 (SSH)
 443 (HTTPS)
 21 (FTP)
 113 (AUTH)
 23 (TELNET)
 53 (DNS)

 554 (RTSP)
 1723 (PPTP)
TCP SYN or ACK Probes?
 Send both!

 Purpose is to find hosts that are up
 We do not care whether the port is active yet
Most valuable UDP “Ping” Port
 Pick a high numbered one

 Anything that responds with ICMP is up
 Most things respond with ICMP
Most Valuable ICMP “Ping” Types
 Echo Request (-PE)


…plus either Timestamp (-PP)



…or Netmask (-PM)
ARP Ping Probing
 Useful only on same subnet

 VERY reliable and much faster
 Sends raw ethernet ARP requests
 Automatically used if host/network is on the local subnet
 Unless --send-ip option specified
Intense Discovery!
 # nmap –sP –PE –PP –PS21,22,23,25,80,113,21339




–PA80,113,443,10042 –source-port 53 –n
–T4 –iR 10000

 [ … lots of IPs … ]
 Host a.b.c.d appears to be up.
 Host w.x.y.z appears to be up.
 Nmap finished: 10000 IP addresses (699 hosts up) scanned

in 2016.564 seconds
Tools
 Whois Lookup

 www.dnsstuff.com
 www.centralops.net
Thank you!!

Weitere ähnliche Inhalte

Was ist angesagt?

Advantages and disadvantages of DBMS
Advantages and disadvantages of DBMSAdvantages and disadvantages of DBMS
Advantages and disadvantages of DBMSMohit Singhal
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxnikshaikh786
 
uniform resource locator
uniform resource locatoruniform resource locator
uniform resource locatorrajshreemuthiah
 
Internet anonymity and privacy
Internet anonymity and privacyInternet anonymity and privacy
Internet anonymity and privacyDooremoore
 
Data recovery power point
Data recovery power pointData recovery power point
Data recovery power pointtutannandi
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information SecurityDr. Loganathan R
 
Information System Concepts & Types of Information Systems
Information System Concepts & Types of Information SystemsInformation System Concepts & Types of Information Systems
Information System Concepts & Types of Information SystemsVR Talsaniya
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES Sagilasagi1
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From MalwareINFONAUTICS GmbH
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to InternetPravinGhosekar
 
Open source intelligence
Open source intelligenceOpen source intelligence
Open source intelligencebalakumaran779
 
Knowledge discovery process
Knowledge discovery process Knowledge discovery process
Knowledge discovery process Shuvra Ghosh
 

Was ist angesagt? (20)

Advantages and disadvantages of DBMS
Advantages and disadvantages of DBMSAdvantages and disadvantages of DBMS
Advantages and disadvantages of DBMS
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptx
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
uniform resource locator
uniform resource locatoruniform resource locator
uniform resource locator
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
Internet anonymity and privacy
Internet anonymity and privacyInternet anonymity and privacy
Internet anonymity and privacy
 
Data mining
Data mining Data mining
Data mining
 
Data recovery power point
Data recovery power pointData recovery power point
Data recovery power point
 
Data dictionary
Data dictionaryData dictionary
Data dictionary
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Web browser
Web browserWeb browser
Web browser
 
Information System Concepts & Types of Information Systems
Information System Concepts & Types of Information SystemsInformation System Concepts & Types of Information Systems
Information System Concepts & Types of Information Systems
 
Data Mining: Data processing
Data Mining: Data processingData Mining: Data processing
Data Mining: Data processing
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
 
Lecture 1 Information System
Lecture 1  Information SystemLecture 1  Information System
Lecture 1 Information System
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internet
 
Open source intelligence
Open source intelligenceOpen source intelligence
Open source intelligence
 
Knowledge discovery process
Knowledge discovery process Knowledge discovery process
Knowledge discovery process
 

Ähnlich wie Information gathering

Threat Hunting with Splunk
Threat Hunting with Splunk Threat Hunting with Splunk
Threat Hunting with Splunk Splunk
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with SplunkSplunk
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with SplunkSplunk
 
Forensic Analysis - Empower Tech Days 2013
Forensic Analysis - Empower Tech Days 2013Forensic Analysis - Empower Tech Days 2013
Forensic Analysis - Empower Tech Days 2013Islam Azeddine Mennouchi
 
Open Source Information Gathering Brucon Edition
Open Source Information Gathering Brucon EditionOpen Source Information Gathering Brucon Edition
Open Source Information Gathering Brucon EditionChris Gates
 
technical-information-gathering-slides.pdf
technical-information-gathering-slides.pdftechnical-information-gathering-slides.pdf
technical-information-gathering-slides.pdfMarceloCunha571649
 
Infosecurity Europe 2016: Operationalizing Threat Intelligence
Infosecurity Europe 2016: Operationalizing Threat IntelligenceInfosecurity Europe 2016: Operationalizing Threat Intelligence
Infosecurity Europe 2016: Operationalizing Threat IntelligenceSplunk
 
Network Vulnerability and Patching
Network Vulnerability and PatchingNetwork Vulnerability and Patching
Network Vulnerability and PatchingEmmanuel Udeagha B.
 
Filar seymour oreilly_bot_story_
Filar seymour oreilly_bot_story_Filar seymour oreilly_bot_story_
Filar seymour oreilly_bot_story_EndgameInc
 
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?Advanced Persistent Threat: come muoversi tra il marketing e la realtà?
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?festival ICT 2016
 
Classification with R
Classification with RClassification with R
Classification with RNajima Begum
 
Network Vulnerabilities And Cyber Kill Chain Essay
Network Vulnerabilities And Cyber Kill Chain EssayNetwork Vulnerabilities And Cyber Kill Chain Essay
Network Vulnerabilities And Cyber Kill Chain EssayKaren Oliver
 
Building a Security Information and Event Management platform at Travis Per...
 	Building a Security Information and Event Management platform at Travis Per... 	Building a Security Information and Event Management platform at Travis Per...
Building a Security Information and Event Management platform at Travis Per...Splunk
 
Ethical hacking at warp speed
Ethical hacking at warp speedEthical hacking at warp speed
Ethical hacking at warp speedSreejith.D. Menon
 
Final project.ppt
Final project.pptFinal project.ppt
Final project.pptshreyng
 
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptxINTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptxSuhailShaik16
 
IDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleIDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleGregory Hanis
 

Ähnlich wie Information gathering (20)

Threat Hunting with Splunk
Threat Hunting with Splunk Threat Hunting with Splunk
Threat Hunting with Splunk
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with Splunk
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with Splunk
 
Forensic Analysis - Empower Tech Days 2013
Forensic Analysis - Empower Tech Days 2013Forensic Analysis - Empower Tech Days 2013
Forensic Analysis - Empower Tech Days 2013
 
Open Source Information Gathering Brucon Edition
Open Source Information Gathering Brucon EditionOpen Source Information Gathering Brucon Edition
Open Source Information Gathering Brucon Edition
 
technical-information-gathering-slides.pdf
technical-information-gathering-slides.pdftechnical-information-gathering-slides.pdf
technical-information-gathering-slides.pdf
 
Infosecurity Europe 2016: Operationalizing Threat Intelligence
Infosecurity Europe 2016: Operationalizing Threat IntelligenceInfosecurity Europe 2016: Operationalizing Threat Intelligence
Infosecurity Europe 2016: Operationalizing Threat Intelligence
 
Network Vulnerability and Patching
Network Vulnerability and PatchingNetwork Vulnerability and Patching
Network Vulnerability and Patching
 
Filar seymour oreilly_bot_story_
Filar seymour oreilly_bot_story_Filar seymour oreilly_bot_story_
Filar seymour oreilly_bot_story_
 
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?Advanced Persistent Threat: come muoversi tra il marketing e la realtà?
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?
 
Ready set hack
Ready set hackReady set hack
Ready set hack
 
Classification with R
Classification with RClassification with R
Classification with R
 
Network Vulnerabilities And Cyber Kill Chain Essay
Network Vulnerabilities And Cyber Kill Chain EssayNetwork Vulnerabilities And Cyber Kill Chain Essay
Network Vulnerabilities And Cyber Kill Chain Essay
 
Building a Security Information and Event Management platform at Travis Per...
 	Building a Security Information and Event Management platform at Travis Per... 	Building a Security Information and Event Management platform at Travis Per...
Building a Security Information and Event Management platform at Travis Per...
 
Ethical hacking at warp speed
Ethical hacking at warp speedEthical hacking at warp speed
Ethical hacking at warp speed
 
Final project.ppt
Final project.pptFinal project.ppt
Final project.ppt
 
Security Handbook
 Security Handbook Security Handbook
Security Handbook
 
OS Fingerprinting
OS FingerprintingOS Fingerprinting
OS Fingerprinting
 
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptxINTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
 
IDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleIDS+Honeypots Making Security Simple
IDS+Honeypots Making Security Simple
 

Mehr von Perfect Training Center (8)

Basics of networking and routing
Basics of networking and routingBasics of networking and routing
Basics of networking and routing
 
Network security
Network securityNetwork security
Network security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cryptography make easy
Cryptography make easyCryptography make easy
Cryptography make easy
 
Basic cryptography
Basic cryptographyBasic cryptography
Basic cryptography
 
Career option for BCA Student
Career option for BCA StudentCareer option for BCA Student
Career option for BCA Student
 
Basics of network
Basics of networkBasics of network
Basics of network
 
Stegnography
StegnographyStegnography
Stegnography
 

Kürzlich hochgeladen

ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 

Kürzlich hochgeladen (20)

ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 

Information gathering

  • 1. Information Gathering Prepared By : Mr. Abhijeet A. More OWNER OF PERFECT TRAINING CENTER
  • 3. Information Gathering  Information gathering refers to gathering information about the issue you‟re facing and the ways other organizations and communities have addressed it  You can gather information using both existing sources and natural examples
  • 4. Information Gathering  Synthesis here refers to analyzing what you‟ve learned from your information gathering, and constructing a coherent program or approach by taking ideas from a number of sources and putting them together to create something that meets the needs of the community and population you‟re working with  Synthesis involves extracting the functional elements of both the analysis of the issue and approaches to it  Functional elements are those that are indispensable either to understanding the issue, or to implementing a particular program
  • 5. Why gather information?  It will help you avoid reinventing the wheel.  It will help you to gain a deep understanding of the issue     so that you can address it properly. You need all the tools possible to create the best program you can. It‟s likely that most solutions aren‟t one size fits all. It can help you ensure your program is culturally sensitive. Knowing what‟s been done in a variety of other circumstances and understanding the issue from a number of different viewpoints may give you new insights and new ideas for your program.
  • 6. Information Gathering Tools Maltego www.paterva.com Maltego is an intelligence and forensics application. It allows for the mining and gathering of information as well as the representation of this information in a meaningful way.
  • 7. What is Maltego?  Maltego is a unique platform developed to deliver a clear threat picture to the environment that an organization owns and operates  Maltego‟s unique advantage is to demonstrate the complexity and severity of single points of failure as well as trust relationships that exist currently within the scope of your infrastructure
  • 8. About Maltego  Maltego is an intelligence and forensics application. It allows for the mining and gathering of information as well as the representation of this information in a meaningful way.  Coupled with its graphing libraries Maltego allows us to identify previously unknown relationships between information, persons and information about persons.  As such, it is a useful tool in the IT security field to map an organization's people and relationships. A valuable aid in exploring the social-engineering attack vector in pentesting investigations.
  • 9. Tools  Nmap (Network Mapper) is a security scanner originally written by Gordon Lyonused to discover hosts and services on a computer network, thus creating a "map" of the network. To accomplish its goal, Nmap sends specially crafted packets to the target host and then analyzes the responses, etc.
  • 10. NMAP
  • 11. NMAP Objective  Find open TCP and/or UDP listeners on a single or range of TCP/IP Addresses  Find out software versions  Find out operating system type  Don‟t get caught doing it  Learn what you have on your network
  • 12. Is Nmap the best tool?  Yes it is  Long history of development and support  Active user base, used in many products  Continuous development and improvements  “Industry Standard” port scanner  It‟s free, open and well documented.  Stay current! (4.00 as of this doc)
  • 13. History of Nmap  First released September 1, 1997 in Phrack 51 “The Art of       Portscanning” http://www.insecure.org/nmap/p51-11.txt Many updates since then: OS Detection (Phrack 54) Idle scanning Version scanning ARP Scanning
  • 14. Host Discovery  TCP SYN Probe (-PS<portlist>)  TCP ACK Probe (-PA<portlist>)  UDP Probe (-PU<portlist>)  ICMP Echo Request/Ping (-PE)  ICMP Timestamp Requset (-PP)  ICMP Netmask Request (-PM)  ARP Probes (-PR)
  • 15. Most valuable TCP „ping‟ Ports?  80 (HTTP)  25 (SMTP)  22 (SSH)  443 (HTTPS)  21 (FTP)  113 (AUTH)  23 (TELNET)  53 (DNS)  554 (RTSP)  1723 (PPTP)
  • 16. TCP SYN or ACK Probes?  Send both!  Purpose is to find hosts that are up  We do not care whether the port is active yet
  • 17. Most valuable UDP “Ping” Port  Pick a high numbered one  Anything that responds with ICMP is up  Most things respond with ICMP
  • 18. Most Valuable ICMP “Ping” Types  Echo Request (-PE)  …plus either Timestamp (-PP)  …or Netmask (-PM)
  • 19. ARP Ping Probing  Useful only on same subnet  VERY reliable and much faster  Sends raw ethernet ARP requests  Automatically used if host/network is on the local subnet  Unless --send-ip option specified
  • 20. Intense Discovery!  # nmap –sP –PE –PP –PS21,22,23,25,80,113,21339   –PA80,113,443,10042 –source-port 53 –n –T4 –iR 10000  [ … lots of IPs … ]  Host a.b.c.d appears to be up.  Host w.x.y.z appears to be up.  Nmap finished: 10000 IP addresses (699 hosts up) scanned in 2016.564 seconds
  • 21. Tools  Whois Lookup  www.dnsstuff.com  www.centralops.net