Fingerprinting with FOCA

In this lab we will see how to do file fingerprinting using FOCA.

On this occasion we are going to do a scan with the tool called FOCA (Fingerprinting Organizations with Collected Archives).

For this practice I will use www.globant.com as the initial target to learn a bit about FOCA and its use. Then we will use some other target to see cases where there is metadata exposed.

Basic use of FOCA

As a first step we configure the project and the domain target:

Once ready, we select the file extensions that we want to be taken into account by FOCA when performing the scan:

Once ready, we click on Search All to start the scan. Once FOCA it starts detecting files we see them listed below the selection of file extensions:

Once we have results available, we can right-click on any of the listed files and give it click on Download to download it and see what information we can obtain from it:

Once the document is downloaded it appears listed in the tree view and we can observe some details about it.

To see the details of the metadata of the file we need to return to the file list and then right-click to the desired file and click on Extract All metadata and then Analyze all metadata.

In this case we do not obtain important information since these documents were already sanitized before being published. But in case some important detail is obtained from the metadata of them, FOCA it will list the different types of information in the tree view so that we can review them:

Analysis of Exposed Metadata with FOCA

If we see an example of a file that does expose certain data in its metadata we will see how this information is presented in FOCA:

We see that among the results we obtain:

  • The server's IP address

  • The Software used to create the File

  • The User used when creating the file

Each scanned file can expose different pieces of information that allow us to obtain a more complete picture of the target during the reconnaissance phase.

In this other example we see that a PDF from the UTN campus reveals different details when analyzed:

In this case we obtain some folders(Folders), some emails and the version of the software used in the creation of the document.

Some documents reveal much more information:

In this case we can see that the metadata extracted from certain documents expose user accounts, emails, printers, folders, even other servers. Clearly sanitizing documents before sharing them is key to preventing external agents from obtaining potentially sensitive details with tools like FOCA.

Last updated

Was this helpful?