wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Footprinting

profile
Abhishek Jaiswal
Jul 08, 2022
2 Likes
1 Discussions
74 Reads

Footprinting is the technique to collect as much information as possible about the targeted network/victim/system. It helps hackers in various ways to intrude on an organization's system. Footprinting can be active as well as passive. Passive footprinting/pseudonymous footprinting involves collecting data without the owner knowing that hackers gather their data. In contrast, active footprints are created when personal data gets released consciously and intentionally or by the owner's direct contact.

 

Some branches of footprinting : 

  • Open-Source Footprinting.
  • Network-based Footprinting.
  • DNS Interrogation.

 

Open-Source Footprinting : 

This type of footprinting is the safest, holding all legal limitations, and hackers can do it without fear because it is legal and, hence, coined the term Open-source. Examples of this type include: finding someone's email address and phone numbers, scanning IP through automated tools, searching for age, DOB, house address, etc. Most companies provide information about themselves on their official website without knowing that hackers can take advantage of it.

 

Network-based Footprinting : 

Using this footprinting category, hacktivists can retrieve information such as user name, information within a group, shared data among individuals, network services, etc.

 

DNS Interrogation : 

After gathering the information from the different areas using various techniques, the hacker usually queries the DNS using pre-existing tools. Many freeware tools are available online to perform DNS interrogation


Comments ()


Sign in

Read Next

FIREWALL

Blog banner

Survey of Which Movies Types people are Prefer to Watch in India.

Blog banner

Privacy LAWs in IT

Blog banner

Virtual Memory

Blog banner

The Memory Hierarchy

Blog banner

Celebrate Diwali the Delicious Way with Meal Maharaj Catering

Blog banner

Understanding E-mail Servers

Blog banner

What is service level Agreement?

Blog banner

Working with AES cryptographic algorithm using crypto++

Blog banner

RACI model in IT services

Blog banner

To-Do List In LISP

Blog banner

Self managing devices

Blog banner

Vikrant’s first blog

Blog banner

The Rise of Evil Twin Attacks: A New Kind Of Spoofing Cyberattack

Blog banner

Exploring Virtual Machines and Computer Forensic Validation Tools

Blog banner

Modern Operating System

Blog banner

Odoo

Blog banner

SPEM

Blog banner

Cache memory

Blog banner

APACHE KAFKA

Blog banner

Theads

Blog banner

Intrusion Detection System

Blog banner

Memory Management

Blog banner

Danger assessment in GIS

Blog banner

K-means use cases

Blog banner

Deadlock in operating system

Blog banner

Open Source Project By Google

Blog banner

Famous Indian dishes that where misunderstood to be Indian

Blog banner

Firewall in Computer Network

Blog banner

Technical Challenges and Directions for Digital Forensics

Blog banner

Uniprocessor scheduling

Blog banner

How the mobile IP is used in GSM architecture.

Blog banner

NETSUITE

Blog banner

Soak knowledge and level up your intellectual potential!!!

Blog banner

Smartsheet

Blog banner

The Five Steps of Data Science

Blog banner

Direct Memory Access

Blog banner

Linux 94

Blog banner

Subnet Masking

Blog banner

How Sleep Impacts Learning and Behaviour for Toddlers?

Blog banner

Yoga in INDIA and ABROAD

Blog banner

What is thread and multithreading ?

Blog banner