What is footprinting.....
A footprinting with the help of various tools many organization offer that make information gathering an easy the task. Footprinting tools are used to collect basic infromation about the target system in order the Exploit them. Hence some information gathered about a taget during footprinting ....
(i) Domain name
(ii) Network blocks
(iii) network services and application
(iv) System architecture
(v) Intrusion detection system
(vi) Authentication mechanisms
(vii) Specific IP address
(viii) Access control mechanisms
(ix) Phone number
(x) Contact addresses
Types of footprinting on ethical hacking ( information gathering)
{1} Passive Footprinting
{2} Active Footprinting.
{1} passive Footprinting..
Passive Footprinting is the process of gathering information on a target by innocuous, or, passive, means. Browsing the target's website, visiting social media profiles of employees, searching for the website on WHOIS, and performing a Google search of the target are all ways of passive Footprinting.
{2} Active Footprinting....
Active Footprinting is the process of using tools and techniques, such as performing a ping sweep or using the traceroute command, to gather information on a target. Active Footprinting can trigger a target's Intrusion Detection System (IDS) and may be logged, and thus requires a level of stealth to successfully do..
Techniques used for foothprinting
(i) DNS queries
(ii) Network enumeration
(iii) Network queries
(iv) Operating system identification
(v) Organizational Queries
(vi) Ping sweeps
(vii) point of contact Queries
(viii) port scanning
(ix) Registrar queries (Whois queries )
(x) SNMAP queries
(xi) World wide web spidering
Footprinting Tool ...
(i) whois
(ii) Nslookup
(iii) some spade
(iv) Super scan
(v) Nmap
(vi) Tcp view
(vii) My ipsuite
(viii) DNS enumeration
(ix) Spider foot
(x) Nessus
(xi) Zone transfer
(xii) port scan
(xiii) HTTP header Grabber
(xiv) Honeypot Detector
0 Comments