create account

Digging into a Web Hacker's Mind. Step 1. Footprinting by programarivm

View this thread on: hive.blogpeakd.comecency.com
· @programarivm · (edited)
$0.11
Digging into a Web Hacker's Mind. Step 1. Footprinting
This fast series is on digging into a web hacker's mind. We are going through the stages involved in penetration testing along with a particular example.

Did you know that hacking is a systematic method consisting of a few steps?

1. Footprinting

2. Scanning

3. Enumeration

4. Penetration

Now, imagine you are a spy working for an intelligence agency. They've asked you to gain access to acme.com as soon as possible within the next few hours. The mission is critical! How would you start your research?

<center>![time-management.jpg](https://cdn.steemitimages.com/DQmc6aXXH7o5XZrkvxvTA5mQRTUKXyToknNys4J8zcGuPcB/time-management.jpg)</center>

Footprinting is step number one, which is basically about studying the target and collecting information about it. But remember, we are in a rush! Time management is crucial to success and conducting a reconnaissance can be time-consuming if not planned properly.

If you want to figure out right now which programming language, framework, CMS or ecommerce platform is run on our victim's web server, a good starting point is to have a rough look at the numbers (September 2018) to get an idea on how to focus our efforts.

<center>
![hacker-mind.jpg](https://cdn.steemitimages.com/DQmSpdPu8GTxoEHiHhFejGxYrsw3qMnk2KMTQBTe3FjHk6f/hacker-mind.jpg)</center>

Here is an estimation of the top five most used web programming languages as stated by [BuiltWith](https://trends.builtwith.com/framework):

<table>
    <thead>
        <tr>
            <th>Language</th>
            <th>Total Live Sites</th>
            <th>Top 1m</th>
            <th>Top 100k</th>
            <th>Top 10k</th>
        </tr>
    </thead>
    <tbody>
        <tr>
            <td>PHP</td>
            <td>50,202,358</td>
            <td>39.85%</td>
            <td>39.75%</td>
            <td>43.27%</td>
        </tr>
        <tr>
            <td>ASP.NET</td>
            <td>42,693,116</td>
            <td>12.56%</td>
            <td>23.47%</td>
            <td>28.90%</td>
        </tr>
        <tr>
            <td>J2EE</td>
            <td>2,859,799</td>
            <td>3.88%</td>
            <td>9.54%</td>
            <td>18.99%</td>
        </tr>
        <tr>
            <td>ASP.NET Ajax</td>
            <td>1,839,200</td>
            <td>3.81%</td>
            <td>8.77%</td>
            <td>10.51%</td>
        </tr>
        <tr>
            <td>Ruby on Rails Token</td>
            <td>2,385,191</td>
            <td>3.06%</td>
            <td>8.17%</td>
            <td>16.18%</td>
        </tr>
    </tbody>
</table>

As a rule of thumb, do some digging on multiple different sources of information and then compare the results obtained; for example, visit the [Usage of server-side programming languages for websites](https://w3techs.com/technologies/overview/programming_language/all) according to W3Techs as well, or even the [TIOBE Index](https://www.tiobe.com/tiobe-index/). It is also recommended to understand how the statistics are calculated in order to avoid bias.

BuiltWith's [Internet Technology Trends](https://trends.builtwith.com/) shows the popular technologies categorized by technology groups. So, which programming language is our victim using?

> The short, hypothetical answer is PHP.

And which framework or CMS, if a any, are they using?

> Most probably they're using WordPress.

<center>
![sherlock-holmes.jpg](https://cdn.steemitimages.com/DQmR4wULoFBZUxdNbafrBU6AhgQ7GqNggdUf22N4nLJw5ZE/sherlock-holmes.jpg)</center>

Note that like Sherlock Holmes, we're following a scientific method already in our research -- inductive, deductive and abductive reasoning are certainly useful tools in a hacker's skill set.

It is important to have a good understanding of logic. Induction is a bottom-up approach especially useful to draw probable conclusions. We just induced that acme.com uses PHP -- WordPress to be precise -- which is not entirely true but a probable conclusion.

Then, it is time to get into hypothesis testing.

How to check if a site is built in WordPress is straightforward with [IsItWP](https://www.isitwp.com/). Also, BuiltWith provides with a detailed report on the technologies with which a particular website is built. Type the victim's URL into BuiltWith's search box and click on the Lookup button to get a complete technology profile. [Wappalyzer](https://www.wappalyzer.com/) helps you identify technologies used on websites too.

Well done! We did it. It took a few seconds only to confirm the base technical stack running on acme.com.
👍  , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,
properties (23)
authorprogramarivm
permlinkdigging-into-a-web-hacker-s-mind-step-1-footprinting
categorytechnology
json_metadata{"tags":["technology","web","hacking","tutorial"],"image":["https://cdn.steemitimages.com/DQmc6aXXH7o5XZrkvxvTA5mQRTUKXyToknNys4J8zcGuPcB/time-management.jpg","https://cdn.steemitimages.com/DQmSpdPu8GTxoEHiHhFejGxYrsw3qMnk2KMTQBTe3FjHk6f/hacker-mind.jpg","https://cdn.steemitimages.com/DQmR4wULoFBZUxdNbafrBU6AhgQ7GqNggdUf22N4nLJw5ZE/sherlock-holmes.jpg"],"links":["https://trends.builtwith.com/framework","https://w3techs.com/technologies/overview/programming_language/all","https://www.tiobe.com/tiobe-index/","https://trends.builtwith.com/","https://www.isitwp.com/","https://www.wappalyzer.com/"],"app":"steemit/0.1","format":"markdown"}
created2018-09-21 18:01:51
last_update2018-09-23 09:53:03
depth0
children1
last_payout2018-09-28 18:01:51
cashout_time1969-12-31 23:59:59
total_payout_value0.093 HBD
curator_payout_value0.012 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length4,526
author_reputation2,631,258,794,707
root_title"Digging into a Web Hacker's Mind. Step 1. Footprinting"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id71,878,849
net_rshares93,579,918,383
author_curate_reward""
vote details (63)
@steemitboard ·
Congratulations @programarivm! You have completed the following achievement on the Steem blockchain and have been rewarded with new badge(s) :

[![](https://steemitimages.com/70x80/http://steemitboard.com/notifications/posts.png)](http://steemitboard.com/@programarivm) Award for the number of posts published
[![](https://steemitimages.com/70x80/http://steemitboard.com/notifications/voted.png)](http://steemitboard.com/@programarivm) Award for the number of upvotes received

<sub>_Click on the badge to view your Board of Honor._</sub>
<sub>_If you no longer want to receive notifications, reply to this comment with the word_ `STOP`</sub>



> You can upvote this notification to help all Steemit users. Learn why [here](https://steemit.com/steemitboard/@steemitboard/http-i-cubeupload-com-7ciqeo-png)!
properties (22)
authorsteemitboard
permlinksteemitboard-notify-programarivm-20180921t225802000z
categorytechnology
json_metadata{"image":["https://steemitboard.com/img/notify.png"]}
created2018-09-21 22:58:03
last_update2018-09-21 22:58:03
depth1
children0
last_payout2018-09-28 22:58:03
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length806
author_reputation38,975,615,169,260
root_title"Digging into a Web Hacker's Mind. Step 1. Footprinting"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id71,896,016
net_rshares0