wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Footprinting

profile
Abhishek Jaiswal
Jul 08, 2022
2 Likes
1 Discussions
74 Reads

Footprinting is the technique to collect as much information as possible about the targeted network/victim/system. It helps hackers in various ways to intrude on an organization's system. Footprinting can be active as well as passive. Passive footprinting/pseudonymous footprinting involves collecting data without the owner knowing that hackers gather their data. In contrast, active footprints are created when personal data gets released consciously and intentionally or by the owner's direct contact.

 

Some branches of footprinting : 

  • Open-Source Footprinting.
  • Network-based Footprinting.
  • DNS Interrogation.

 

Open-Source Footprinting : 

This type of footprinting is the safest, holding all legal limitations, and hackers can do it without fear because it is legal and, hence, coined the term Open-source. Examples of this type include: finding someone's email address and phone numbers, scanning IP through automated tools, searching for age, DOB, house address, etc. Most companies provide information about themselves on their official website without knowing that hackers can take advantage of it.

 

Network-based Footprinting : 

Using this footprinting category, hacktivists can retrieve information such as user name, information within a group, shared data among individuals, network services, etc.

 

DNS Interrogation : 

After gathering the information from the different areas using various techniques, the hacker usually queries the DNS using pre-existing tools. Many freeware tools are available online to perform DNS interrogation


Comments ()


Sign in

Read Next

Classification Algorithms (Decision trees, SVM, Logistic regreession)

Blog banner

FILE SHARING

Blog banner

OS Evolution Achievements

Blog banner

Virtual memory

Blog banner

QUANTUM COMPUTING IN SECURITY:A GAME CHANGER IN DIGITAL WORLD

Blog banner

Challenges and risks in service operations

Blog banner

Building Confidence in Children Through Daily Routines and Play

Blog banner

History of ITIL

Blog banner

Self defence

Blog banner

10 Types of Friends in every friend group

Blog banner

File management

Blog banner

The Truth Behind Viral DIY Dental Hacks

Blog banner

Why is it hard to design an Operating Systems ?

Blog banner

Sweet and Sour Mango Pickle (Gol Keri)

Blog banner

SQL Injection Techniques

Blog banner

Data Science & AI

Blog banner

Memory Management

Blog banner

Memory Management

Blog banner

Top 5 Places To Stay And Visit In Berlin, Germany

Blog banner

The Role of Cyber Forensics in Addressing Cyber security Challenges in Smart Cities

Blog banner

Web browser forensics:Tools,Evidence collection and analysis

Blog banner

Short note on Microsoft office

Blog banner

Title: Modern Operating Systems: Powering the Digital Era

Blog banner

OS ASSIGNMENT

Blog banner

IoT Architecture Based Security

Blog banner

Cache Memory

Blog banner

Evolution of Operating Systems

Blog banner

Why Soft Skills Matter as Much as Grades?

Blog banner

A Happier Workplace Starts with Healthy Lunches by Meal Maharaj

Blog banner

1.1 basic elements

Blog banner

Landslide Hazard

Blog banner

EID UL FITR

Blog banner

Deadlock and Starvation

Blog banner

Python as a tool for data analysis

Blog banner

KAHAWA TEA

Blog banner

The New Classic: Indo Western Patola Outfits for Today’s Woman

Blog banner

Top 5 Post-Wedding Skin Care Tips

Blog banner

Synchronization

Blog banner

MD5 Collisions and the impact on computer forensics

Blog banner

Music helps reduce stress

Blog banner

How to write a cover letter

Blog banner

Why am I never satisfied with my Life?

Blog banner