wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Footprinting

profile
Abhishek Jaiswal
Jul 08, 2022
2 Likes
1 Discussions
74 Reads

Footprinting is the technique to collect as much information as possible about the targeted network/victim/system. It helps hackers in various ways to intrude on an organization's system. Footprinting can be active as well as passive. Passive footprinting/pseudonymous footprinting involves collecting data without the owner knowing that hackers gather their data. In contrast, active footprints are created when personal data gets released consciously and intentionally or by the owner's direct contact.

 

Some branches of footprinting : 

  • Open-Source Footprinting.
  • Network-based Footprinting.
  • DNS Interrogation.

 

Open-Source Footprinting : 

This type of footprinting is the safest, holding all legal limitations, and hackers can do it without fear because it is legal and, hence, coined the term Open-source. Examples of this type include: finding someone's email address and phone numbers, scanning IP through automated tools, searching for age, DOB, house address, etc. Most companies provide information about themselves on their official website without knowing that hackers can take advantage of it.

 

Network-based Footprinting : 

Using this footprinting category, hacktivists can retrieve information such as user name, information within a group, shared data among individuals, network services, etc.

 

DNS Interrogation : 

After gathering the information from the different areas using various techniques, the hacker usually queries the DNS using pre-existing tools. Many freeware tools are available online to perform DNS interrogation


Comments ()


Sign in

Read Next

Regression Analysis

Blog banner

New Ransomware Encrypts Your Android And Then Changes PIN Lock

Blog banner

Modern Operating System

Blog banner

Types of Malware in Cyber Security

Blog banner

CSI and Organizational Change

Blog banner

Introduction to Data Science: Life Cycle & Applications

Blog banner

NodeJs

Blog banner

Uniprocessor Scheduling

Blog banner

Pro-Tips On How To Keep your Foot Healthy

Blog banner

Smart Homes | Zigbee Alliance

Blog banner

Sniffing: A Cyber Security Threat

Blog banner

Malware

Blog banner

Uniprocessor and Types

Blog banner

Install Ubuntu in Vmware

Blog banner

Full Disk Encryption on Digital Forensics

Blog banner

Raid

Blog banner

Deadlock

Blog banner

Embedded Operating System

Blog banner

Making Money through Instagram

Blog banner

GIS Mapping

Blog banner

Trends that began during the pandemic

Blog banner

Scheduling in Operating Systems

Blog banner

DATA BREACH CAUSES CHALLENGES PREVENTION AND FUTURE DIRECTIONS

Blog banner

GIS

Blog banner

OS Assignment 3 Deadlock

Blog banner

GUIDE TO GIS

Blog banner

Modern operating system

Blog banner

Efficiency of SQL Injection Method in Preventing E-Mail Hacking

Blog banner

virtual machine

Blog banner

Direct Memory Access

Blog banner

Evolution of OS

Blog banner

What is Brute Force Attack? How to defend against it?

Blog banner

Race Condition in Operating Theatre

Blog banner

security requirements for safe e-payment

Blog banner

Dal Bafla Recipe

Blog banner

Fudgy Tahini Date Chocolate Bars

Blog banner

Virtual Machine

Blog banner

Sleep Matters: The Science Behind Toddler Naps

Blog banner

WORKFRONT SOFTWARE

Blog banner

Top 4 Places To Stay In Copenhagen

Blog banner

IOT- Internet Of Things

Blog banner

Importance Of Yoga.

Blog banner