02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Exam Essentials 97<br />

I want to introduce some basic techniques that can prove useful at this stage of information<br />

gathering:<br />

Eavesdropping This is the practice of covertly listening in on the conversations of others.<br />

It includes listening to conversations or just reading correspondence in the form of faxes or<br />

memos. Under the right conditions, you can glean a good amount of insider information<br />

using this technique.<br />

Shoulder Surfing This is the act of standing behind a victim while they interact with a<br />

computer system or other medium while they are working with secret information. Using<br />

shoulder surfing allows you to gain passwords, account numbers, or other secrets.<br />

Dumpster Diving This is one of the oldest means of social engineering, but it’s still an<br />

effective one. Going through a victim’s trash can easily yield bank accounts, phone records,<br />

source code, sticky notes, CDs, DVDs, and other similar items. All of this is potentially<br />

damaging information in the wrong hands.<br />

Summary<br />

This chapter explored the process of gaining information about a target. As you saw, the<br />

first step is to use search engines to gain initial information about a target with the goal of<br />

seeing what was available and how the data you discover can guide your future efforts.<br />

In the next phase you move on to gathering information from other sources such as<br />

e-mail and financial resources. As you learned, e-mail tracking tools and notifications allow<br />

you to build a profile of target organizations and see how they respond to messages (which<br />

may assist in phishing efforts later).<br />

Once you’ve gathered enough information, you try to refine the results to get to the<br />

information you truly want or can act upon. Using techniques such as Google hacking and<br />

social engineering, you can gain even more insight.<br />

Exam Essentials<br />

Understand the process of footprinting. Know how footprinting functions and what the<br />

ultimate goals of the process are. Understand the various types of information that may be<br />

obtained.<br />

Know the different places and sources through which to gain information. Understand<br />

that a complete profile of an organization cannot be built from one source and that you<br />

must access and investigate many different sources to get a complete picture. You can use<br />

websites, people, and other sources to fill out the picture of your target.<br />

Know how to do competitive analysis. Understand that if you run into a “black hole”<br />

and cannot get a complete picture from analyzing a target directly you can get information<br />

from competitors. Competitors and outside sources may have done research for you in the<br />

form of competitive analysis.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!