wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Footprinting

profile
Abhishek Jaiswal
Jul 08, 2022
2 Likes
1 Discussions
74 Reads

Footprinting is the technique to collect as much information as possible about the targeted network/victim/system. It helps hackers in various ways to intrude on an organization's system. Footprinting can be active as well as passive. Passive footprinting/pseudonymous footprinting involves collecting data without the owner knowing that hackers gather their data. In contrast, active footprints are created when personal data gets released consciously and intentionally or by the owner's direct contact.

 

Some branches of footprinting : 

  • Open-Source Footprinting.
  • Network-based Footprinting.
  • DNS Interrogation.

 

Open-Source Footprinting : 

This type of footprinting is the safest, holding all legal limitations, and hackers can do it without fear because it is legal and, hence, coined the term Open-source. Examples of this type include: finding someone's email address and phone numbers, scanning IP through automated tools, searching for age, DOB, house address, etc. Most companies provide information about themselves on their official website without knowing that hackers can take advantage of it.

 

Network-based Footprinting : 

Using this footprinting category, hacktivists can retrieve information such as user name, information within a group, shared data among individuals, network services, etc.

 

DNS Interrogation : 

After gathering the information from the different areas using various techniques, the hacker usually queries the DNS using pre-existing tools. Many freeware tools are available online to perform DNS interrogation


Comments ()


Sign in

Read Next

Broken Authentication Attacks

Blog banner

10 Interesting Facts about Death Note

Blog banner

How To Invest in Indian Stock Market For Beginners. ~ Tutorial 2 (NSDL And CSDL) Continued...

Blog banner

Modern Operating System

Blog banner

POVERTY:Causes and solutions to problems

Blog banner

The Five Steps of Data Science

Blog banner

26/11 The Black Day Of Mumbai

Blog banner

Place to visit in pune

Blog banner

Internet: The Vast Ocean Of Knowledge.

Blog banner

Navigating the Digital Battlefield: Security Breaches and Effective Countermeasures

Blog banner

Virtual Memory

Blog banner

child Labour

Blog banner

Why Soft Skills Matter as Much as Grades?

Blog banner

Full Disk Encryption on Digital Forensics

Blog banner

M commerce

Blog banner

Data Visualization- Importance and tools (Tableau,Power BI, Matplotlib)

Blog banner

Street foods

Blog banner

INTERNET SECURITY

Blog banner

Hacking

Blog banner

LEMON PICKLE (NIMBU KA ACHAR)

Blog banner

Deadlocks

Blog banner

The Rise of Polo Tourism in the USA: How Travellers Are Blending Luxury Stays with Elite Sports

Blog banner

OLA

Blog banner

Memory Management Techniques

Blog banner

Lifestyle of a photographer

Blog banner

Install Ubuntu in Vmware

Blog banner

The Power of Forensic Watermarking in the Fight Against Content Piracy

Blog banner

What are Virtual Machines

Blog banner

Man VS Nature

Blog banner

Who decides your overthinking, anyway?

Blog banner

Real-time Scheduling - 53003230061

Blog banner

Service Transition Process in ITSM

Blog banner

FIREWALL

Blog banner

Hello World

Blog banner

Top Career Paths After a B.Com Degree in Mumbai: What’s Next for You?

Blog banner

Types Of Interrupt

Blog banner

Health and fitness in technology

Blog banner

Deadlocks

Blog banner

Sessions In OS.

Blog banner

Types of Hackers.

Blog banner

Real time scheduling

Blog banner

MUTUAL EXCLUSION

Blog banner