0% found this document useful (0 votes)
70 views14 pages

Footprinting

Footprinting is the first step of reconnaissance where a hacker gathers information about a target system without directly interacting with it. There are two types of footprinting - active which uses tools like ping sweeps and traceroute to directly probe the target, and passive which collects data innocuously through methods like searching online databases and employees' social media. The information collected during footprinting helps identify opportunities for penetrating the target.

Uploaded by

Adlina Anwar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
70 views14 pages

Footprinting

Footprinting is the first step of reconnaissance where a hacker gathers information about a target system without directly interacting with it. There are two types of footprinting - active which uses tools like ping sweeps and traceroute to directly probe the target, and passive which collects data innocuously through methods like searching online databases and employees' social media. The information collected during footprinting helps identify opportunities for penetrating the target.

Uploaded by

Adlina Anwar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 14

Footprinting

Information Technology System Management


Footprinting
• ethical hacking technique used to gather as much data as possible
about a specific targeted computer system, an infrastructure and
networks to identify opportunities to penetrate them.
• part of reconnaissance process which is used for gathering possible
information about a target computer system or network

• 2 types:
1. Active footprinting
2. Passive footprinting
Footprinting
• Footprinting is basically the first step where hacker gathers as much information as possible to
find ways to intrude into a target system or at least decide what type of attacks will be more
suitable for the target.
• During this phase, a hacker can collect the following information −
• Domain name
• IP Addresses
• Namespaces
• Employee information
• Phone numbers
• E-mails
• Job Information
• https://www.tutorialspoint.com/ethical_hacking/ethical_hacking_footprinting.htm
Active Footprinting
• What is active footprinting? Active footprinting describes the process
of using tools and techniques, like using the traceroute commands or
a ping sweep -- Internet Control Message Protocol sweep -- to
collect data about a specific target. This often triggers the target's
intrusion detection system (IDS).
Ping sweep

• In computing, a ping sweep is a method that can establish a range of 


IP addresses which map to live hosts.
• The classic tool used for ping sweeps is fping,[1][2][3] which traditionally
was accompanied by gping to generate the list of hosts for large
subnets,[4] although more recent versions of fping include that
functionality.[1] Well-known tools with ping sweep capability include 
nmap for Unix and Windows systems, and the Pinger software from
Rhino9 for Windows NT.[4][5] There are many other tools with this
capability, including:[2][5] Hping, IEA's aping, Simple Nomad's
ICMPEnum, SolarWind's Ping Sweep, and Foundstone's SuperScan.
There is also a ping sweep tool for Windows, Mac, Linux, Android, and
iOS called Fing made by Overlook Soft.
What is an Intrusion Detection System?

• An intrusion detection system (IDS) is a device or software


application that monitors a network for malicious activity or policy
violations.
IDS Detection Types

• There is a wide array of IDS, ranging from antivirus software to tiered


monitoring systems that follow the traffic of an entire network. The
most common classifications are:
• Network intrusion detection systems (NIDS): A system that
analyzes incoming network traffic.
• Host-based intrusion detection systems (HIDS): A system that
monitors important operating system files.
Traceroute

• Information can also be gathered using the command Tracert ("


traceroute"), which is used to trace a path between a user and
the target system on the networks. That way it becomes clear
where a request is being forwarded and through which devices.
In Linux systems, the tracepath and traceroute commands are
also available for doing traceroute operations.[9
Passive Footprinting
• What is passive footprinting?
• As the name implies, passive footprinting involves collecting data
about a specific target using innocuous methods, like performing a
Google search, looking through Archive.org, using NeoTrace,
browsing through employees' social media profiles, looking at job
sites and using Whois, a website that provides the domain names
and associated networks fora specific organization. It is a stealthier
approach to footprinting because it does not trigger the target's IDS.
•  crawling websites and social media platforms, among other methods. For
example, tools like tcpdump and Wireshark can be used to capture
packets sent and received by the target system.
Crawling

• Crawling is the process of surfing the internet to get the


required information about the target. The sites surfed can
include the target's website, blogs and social networks. The
information obtained by this method will be helpful in other
methods.
WHOIS

• WHOIS[6] is a web application used to get information about the


target website, such as the administrator's e-mail address and
details about the registration. WHOIS is a very large database
and contains information of approximately all clearnet websites.
It can be searched by domain name
Search engines

• Search engines such as Google can also be used to gather


information about the target system. It depends on how well one
knows how to use search engines to collect information. If used
properly, the attacker can gather much information about a
company, its career, its policies, etc.
Negative web search

• Negative web search will reveal some other websites when


performed on the target website. Negative websites can act as
resources for insight about the flaws of the target website.[10]
• Browsing the target's websitevisiting social media profiles of
employees
• searching for the website on WHOIS
• performing a Google search

#all ways of passive Footprinting

You might also like