02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

96 Chapter 4 ■ Footprinting and Reconnaissance<br />

A couple of things to note when using these advanced operators are frequency<br />

and number of keywords. First, be careful of how many times you<br />

use the operators in a short period of time as Google can shut down queries<br />

using these advanced operators if too many appear in a short period<br />

of time. Second, keep in mind that there are many more keywords than I<br />

can cover here, including filetype.<br />

Try using these Google hacks only after you have done some initial reconnaissance. The<br />

reasoning here is that after you have some initial information about a target from your more<br />

general investigation, you can then use a targeted approach based on what you have learned.<br />

To fully appreciate the power of Google hacking, practice on your own,<br />

trying different combinations and variations of the commands mentioned<br />

here. That way, you become familiar with the results they are capable of<br />

providing and how each works.<br />

Gaining Network Information<br />

An important step in footprinting is to gain information, where possible, about a target’s<br />

network. Fortunately there are plenty of tools available for this purpose, many of which<br />

you may already be familiar with.<br />

Whois This utility helps you gain information about a domain name, including ownership<br />

information, IP information, netblock data, and other information where available. The<br />

utility is freely available in Linux and Unix and must be downloaded as a third-party addon<br />

for Windows.<br />

Tracert This utility is designed to follow the path of traffic from one point to another,<br />

including intermediate points in between. The utility provides information on the relative<br />

performance and latency between hops. Such information can be useful if a specific victim<br />

is targeted because it may reveal network information such as server names and related<br />

details. The utility is freely available for all OSs.<br />

If you have a hard time visualizing the command-line aspect of Tracert,<br />

there are many graphical tools available that perform the same function<br />

and more. Some of the visual tools for Tracert can even display a map<br />

showing the path of the traffic as well as detailed Whois information for<br />

each point or hop the traffic takes.<br />

Social Engineering: The Art of Hacking Humans<br />

Inside the system and working with it is the human being, which is frequently the easiest<br />

component to hack. Human beings tend to be, on average, fairly easy to obtain information<br />

from. Although Chapter 10, “Social Engineering,” delves into this topic in greater depth,

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!