CEH_ Official Certified Ethical Hacker Review Guide_ Exam 312-50 - Kimberly Graves [18]
These techniques are part of system hacking, which is discussed in Chapter 4: "System Hacking."
Hacking Tools
NeoTrace, VisualRoute, and VisualLookout are all packet-tracking tools with a GUI or visual interface. They plot the path the packets travel on a map and can visually identify the locations of routers and other internetworking devices. These tools operate similarly to traceroute and perform the same information gathering; however, they provide a visual representation of the results.
Understand How E-Mail Tracking Works
E-mail-tracking programs allow the sender of an e-mail to know whether the recipient reads, forwards, modifies, or deletes an e-mail. Most e-mail-tracking programs work by appending a domain name to the e-mail address, such as readnoti fy. com. A single-pixel graphic file that isn't noticeable to the recipient is attached to the e-mail. Then, when an action is performed on the e-mail, this graphic file connects back to the server and notifies the sender of the action.
Hacking Tool
eMailTracking Pro and Mai 1Tracki ng. com are tools that allow an ethical hacker to track e-mail messages. When using these tools to send an e-mail, forward an e-mail, reply to an e-mail, or modify an e-mail, the resulting actions and tracks of the original e-mail are logged. The sender is notified of all actions performed on the tracked e-mail by an automatically generated e-mail.
Understand How Web Spiders Work
Spammers and anyone else interested in collecting e-mail addresses from the Internet can use web spiders. A web spider combs websites collecting certain information such as email addresses. The web spider uses syntax such as the @ symbol to locate email addresses then copies them into a list. These addresses are then added to a database and may be used later to send unsolicited e-mails. Web spiders can be used to locate all kinds of information on the Internet. A hacker can use a web spider to automate the information gathering process. A method to prevent web spidering of your website is to put the robots. txt file in the root of your website with a listing of directories that you want to protect from crawling.
Exam Essentials
Know how to analyze a company's infrastructure from job postings. Search job postings from the target company or organization to determine system versions and other vital pieces of information such as firewall or IDS types and server types. Google hacking can be used to gather information from these locations, making it easy for a hacker to quickly locate information about a target.
Know how to search for a company's news, press releases, blogs, and newsgroup postings. Use all available public resources to locate information about a target company and gather data about its network and system security.
Understand how to gather information about a company's employees. Use Yahoo! People search or other Internet search engines to find employees of the target company.
Know how to query DNS for specific record information. Know how to use DNSstuff, nslookup, or Sam Spade to query a DNS server for record information such as hosts and IP addresses.
Understand how to perform Whois lookups for personal or company information. Know how to use the ARIN, LACNIC, RIPE NCC, APNIC, and Whois databases to locate registrar and company contact information.
Know how to find the name of a target company's external and internal domain names. You should be able to use the Whois and Sam Spade tools to locate the domain information for a given company. Knowledge of the ARIN database is also necessary for the exam.
Know how to physically locate a target company's web server and other network infrastructure devices. Use NeoTrace, VisualRoute, or VisualLookout to get a graphical view of the route to a target company's network. These tools enable you to physically locate the servers.
Know how to track e-mail to or from a company. You should be able to use