Footprinting tools and footprinting techniques

 What is  footprinting.....

Footprinting tools and techniques,what toos can be used for footprinting, tools of footprinting, tools used in footpriniting

A footprinting with the help of various tools many organization offer that make information  gathering an easy the task. Footprinting tools are used to  collect basic infromation about the target system in order the Exploit them. Hence some information gathered about a taget during footprinting ....

(i)  Domain name 

(ii) Network blocks 

(iii) network services and application 

(iv) System architecture

(v) Intrusion detection system 

(vi) Authentication mechanisms 

(vii) Specific IP address 

(viii) Access control  mechanisms 

(ix) Phone number 

(x) Contact addresses 


Types of footprinting on ethical hacking ( information gathering) 


{1} Passive Footprinting

{2} Active Footprinting.

{1} passive Footprinting.. 

Passive Footprinting is the process of gathering information on a target by innocuous, or, passive, means. Browsing the target's website, visiting social media profiles of employees, searching for the website on WHOIS, and performing a Google search of the target are all ways of passive Footprinting.

{2} Active Footprinting.... 

Active Footprinting is the process of using tools and techniques, such as performing a ping sweep or using the traceroute command, to gather information on a target. Active Footprinting can trigger a target's Intrusion Detection System (IDS) and may be logged, and thus requires a level of stealth to successfully do.

Techniques used for foothprinting

(i) DNS queries 

(ii) Network enumeration 

(iii) Network queries 

(iv) Operating system identification 

(v) Organizational Queries 

(vi) Ping sweeps 

(vii) point of contact Queries 

(viii) port scanning 

(ix) Registrar queries (Whois queries )

(x) SNMAP queries 

(xi) World wide web spidering 

Footprinting  Tool ...

(i)  whois 

(ii) Nslookup

(iii) some spade 

(iv) Super scan

(v) Nmap

(vi) Tcp view

(vii) My ipsuite

(viii) DNS enumeration 

(ix) Spider foot 

(x) Nessus 

(xi) Zone transfer 

(xii) port scan 

(xiii) HTTP header Grabber 

(xiv) Honeypot Detector 


Post a Comment

0 Comments