wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Footprinting

profile
Abhishek Jaiswal
Jul 08, 2022
2 Likes
1 Discussions
74 Reads

Footprinting is the technique to collect as much information as possible about the targeted network/victim/system. It helps hackers in various ways to intrude on an organization's system. Footprinting can be active as well as passive. Passive footprinting/pseudonymous footprinting involves collecting data without the owner knowing that hackers gather their data. In contrast, active footprints are created when personal data gets released consciously and intentionally or by the owner's direct contact.

 

Some branches of footprinting : 

  • Open-Source Footprinting.
  • Network-based Footprinting.
  • DNS Interrogation.

 

Open-Source Footprinting : 

This type of footprinting is the safest, holding all legal limitations, and hackers can do it without fear because it is legal and, hence, coined the term Open-source. Examples of this type include: finding someone's email address and phone numbers, scanning IP through automated tools, searching for age, DOB, house address, etc. Most companies provide information about themselves on their official website without knowing that hackers can take advantage of it.

 

Network-based Footprinting : 

Using this footprinting category, hacktivists can retrieve information such as user name, information within a group, shared data among individuals, network services, etc.

 

DNS Interrogation : 

After gathering the information from the different areas using various techniques, the hacker usually queries the DNS using pre-existing tools. Many freeware tools are available online to perform DNS interrogation


Comments ()


Sign in

Read Next

Steganography

Blog banner

Tiranga - Abbas Haveliwala

Blog banner

Analysis of Digital Evidence In Identity Theft Investigations

Blog banner

What is the point of living if we can die at any moment of our lives ?

Blog banner

Explain website hacking issues

Blog banner

Mobile Survey

Blog banner

File Management

Blog banner

Remote Work in 2026

Blog banner

Direct Memory Access

Blog banner

How to tie a Tie

Blog banner

Therapy Myths That Need to End in 2025

Blog banner

My Favorite Sportsperson

Blog banner

Partnership in Learning: How Parent Involvement Shapes a Child’s Early Education

Blog banner

VIRTUAL MACHINES

Blog banner

1.1 basic elements

Blog banner

VIRTUAL MACHINE

Blog banner

Earth with no trees

Blog banner

Importance Of Time

Blog banner

Digital marketing spotlight “Dove’s Real Beauty Campaign”

Blog banner

Asana

Blog banner

IP ADDRESS

Blog banner

virtual machines and virtualization

Blog banner

Pipedrive

Blog banner

Intrusion Detection System

Blog banner

Super Garlicky Tomato Soup with Smashed White Beans

Blog banner

Product Discount Calculator

Blog banner

Oracle Corporation

Blog banner

Heart Fulness Meditation

Blog banner

Microsoft Word

Blog banner

HUBSPOT

Blog banner

The New Dr. Frankenstein who will perform first full head transplant

Blog banner

Embaded operating system

Blog banner

Mumbai

Blog banner

BLOCKCHAIN MACHANISM

Blog banner

Development Of Modern Operating System

Blog banner

Navigating the Digital Battlefield: Security Breaches and Effective Countermeasures

Blog banner

Password Generator - Lisp

Blog banner

OPERATING SYSTEM

Blog banner

Dekkers Algorithm : Ensuring Safe Process Synchronization

Blog banner

Risk management in IT

Blog banner

Have You Explored India Yet?

Blog banner

Fault tolerance

Blog banner