wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Footprinting

profile
Abhishek Jaiswal
Jul 08, 2022
2 Likes
1 Discussions
74 Reads

Footprinting is the technique to collect as much information as possible about the targeted network/victim/system. It helps hackers in various ways to intrude on an organization's system. Footprinting can be active as well as passive. Passive footprinting/pseudonymous footprinting involves collecting data without the owner knowing that hackers gather their data. In contrast, active footprints are created when personal data gets released consciously and intentionally or by the owner's direct contact.

 

Some branches of footprinting : 

  • Open-Source Footprinting.
  • Network-based Footprinting.
  • DNS Interrogation.

 

Open-Source Footprinting : 

This type of footprinting is the safest, holding all legal limitations, and hackers can do it without fear because it is legal and, hence, coined the term Open-source. Examples of this type include: finding someone's email address and phone numbers, scanning IP through automated tools, searching for age, DOB, house address, etc. Most companies provide information about themselves on their official website without knowing that hackers can take advantage of it.

 

Network-based Footprinting : 

Using this footprinting category, hacktivists can retrieve information such as user name, information within a group, shared data among individuals, network services, etc.

 

DNS Interrogation : 

After gathering the information from the different areas using various techniques, the hacker usually queries the DNS using pre-existing tools. Many freeware tools are available online to perform DNS interrogation


Comments ()


Sign in

Read Next

Memory Management

Blog banner

How to feel Happy everyday day

Blog banner

Apple

Blog banner

How to grow followers on Instagram business account?

Blog banner

1 Dentist in Maroubra, Sydney and her 10 obsessions

Blog banner

Operating system evolution

Blog banner

RAID

Blog banner

Celebrate Diwali the Delicious Way with Meal Maharaj Catering

Blog banner

BEAUTY IS IN THE EYE OF THE BEHOLDER

Blog banner

Understanding Mobile Device Forensics

Blog banner

Deadlock

Blog banner

Microsoft Windows Overview

Blog banner

Why Data Privacy Is Changing Online Advertising

Blog banner

Getting into Anime

Blog banner

How Do I Get Rid of My People-Pleasing Behaviour?

Blog banner

Koinex is shutting down and here is how you can withdraw...

Blog banner

How International Schools Build Global-Minded Students through Curriculum & Activities

Blog banner

Proton mail

Blog banner

DATA SCIENCE IN BUSINESS AND MARKETING

Blog banner

Memory hierarchy

Blog banner

IoT Evolution

Blog banner

Zero-Day Attack

Blog banner

MOVEMBER

Blog banner

Threads

Blog banner

Jira Software

Blog banner

Types of email

Blog banner

Mumbai

Blog banner

What is thread and alse multithreading

Blog banner

Facebook marketing

Blog banner

FASHION

Blog banner

Everything You Need for a Perfect Stay in Arcadia, Florida, USA.

Blog banner

Why Summer Break Is Important for Emotional and Cognitive Growth?

Blog banner

Different types of scam Fraud

Blog banner

EVOLUTION OF THE MIRCOPROCESSOR

Blog banner

Human Error: The weakest link in Cybersecurity

Blog banner

Veg Mix Pickle

Blog banner

Deadlock

Blog banner

Skills An Ethical Hacker Must Have

Blog banner

Deadlock and Starvation

Blog banner

VIRTUAL MACHINE

Blog banner

Security and E-mail

Blog banner

Deadlock in operating system

Blog banner