Skip to main content

Website Enumeration & Information Gathering [Part 1]

Linux, Networking & Security are the domains of my interest.

website-enumeration-information-gathering-part-1

What Is Enumeration?

Enumeration is defined as a process that establishes an active connection with the target hosts to discover potential attack vectors in the system, and the same can be used for further exploitation of the system. Enumeration is used to gather the following: Usernames, group names, Hostnames, Network shares and services, etc.

Why Do We Do It?

  • We want to learn as much as we can about our target before we perform any type of attack.
  • We want to know what we are dealing with and what the structure behind the website looks like.
  • Does it have forms we can attack? Where is it located? What is the website used for? Is there any information about the website that could be useful for us?

What to Look for on a Website

  • IP addresses using tools like Nslookup, and host.
  • Technical info on IP address after putting it in a scanner. Like open ports and services running on those open ports.
  • Website structure (What is the website made of? Does it have js? or PHP ? or any third-party application running?)
  • Login page/registration forms
  • Type of server the website is hosted on
  • Type of OS hosting the website
  • Does the server have some other ports open besides the ports that are used to host the website?
  • Get information from a database that it shouldn’t give us such as other users' passwords.
  • Check if the site has good encryption, maybe it has weak encryption or no encryption which can be exploited through a man-in-the-middle attack that could capture the passwords as plain text.

Techniques + Tools

  1. Google Dorking
  2. Ping, Host, Nslookup
  3. Whatweb
  4. dirb
  5. nmap
  6. nikto
  7. Burp Suite

Google Dorking

Using Google's advanced search techniques to discover information that we might find useful.

Ex. In google search, type the following

site:tesla.com filetype: pdf

// returns all the pdf files available on the website tesla.com

website-enumeration-information-gathering-part-1

Let’s find out some emails on the website “kiit.ac.in”.

website-enumeration-information-gathering-part-1

Searching the ‘admin’ keyword inside the title of the page or inside the URL.

website-enumeration-information-gathering-part-1

To find more useful commands on google dorks use “exploit-db.com”.

website-enumeration-information-gathering-part-1
website-enumeration-information-gathering-part-1

Ping, Host, Nslookup

Ping

The “ping” command can be used to find the IP address of the website as well as to check if a particular website is up and running.

website-enumeration-information-gathering-part-1

NOTE: If the ping doesn’t work then it doesn’t necessarily mean that the website is offline. Some websites do not allow pinging even if they are online.

Host and Nslookup

Another command to know the IP address is “host” and “nslookup”.

website-enumeration-information-gathering-part-1
website-enumeration-information-gathering-part-1

Whois

  • Used for gathering publicly available information about details of website registration that the owner of the website provides.
  • Might also provide emails, phone numbers and physical addresses.
"REDACTED FOR PRIVACY" means that the information is hidden.

"REDACTED FOR PRIVACY" means that the information is hidden.

Active vs. Passive Information Gathering

  • When we were using the above commands we used active information gathering because we interacted with the website the whole time.
  • Now if we use other websites to get the above information it will be passive information gathering because our target website won’t be able to see who searched that information for them because we never interacted with the website ourselves instead a third-party website did that task for us.

Example

website-enumeration-information-gathering-part-1

Bonus Resources

  1. OWASPBWA vulnerable machine.
  2. OWASPBWA VM setup video.

This article is accurate and true to the best of the author’s knowledge. Content is for informational or entertainment purposes only and does not substitute for personal counsel or professional advice in business, financial, legal, or technical matters.

© 2022 Ashutosh Singh Patel