Ethical Experts
Ethical Experts

A Community Dedicated to Helping and Learning . Here You Will Get Hacking Tutorials and Monetizing Methods . We Hope You Have a Pleasant Stay
 
HomeHome  SearchSearch  FAQFAQ  RegisterRegister  Log in  
Still Currently working on the forum design, until I find a perfect design that can sit there for the whole life :p .. Please Bare with us if you see the design change while / after you refresh a page or return ! Sorry for the Inconvenience ~!
Search
 
 

Display results as :
 
Rechercher Advanced Search
Latest topics
» Hack Pack : Largest Hacking Tools Collection
Tue Apr 28, 2015 9:35 am by THE-OUTSIDER

» Hi everyone!
Fri Nov 07, 2014 11:24 pm by zekrum

» Hacking Email ID's
Thu Sep 25, 2014 7:22 pm by NAVEEN KUMAR . S

» entering in a computer binary
Sat Sep 20, 2014 1:29 pm by erosh23

» hi hackers
Sat Sep 20, 2014 1:26 pm by erosh23

» Introduce Yourself !
Sat Sep 20, 2014 1:23 pm by erosh23

» Hello guys
Wed Jul 30, 2014 10:52 pm by RZero67

» need botnet like zues Betabot or any good botnet files please admin help me
Fri Jul 25, 2014 9:44 pm by sire_roktiv

» Extension Spoofer v0.1 [Beta Release]
Fri Jul 11, 2014 9:33 am by The Joker

Most Viewed Topics
Hack Pack : Largest Hacking Tools Collection
HACK WIFI PASSWORD USING CMD WHEN YOU ARE CONNECTED WITH WIFI
Hack Your BroadBand !! RISK FREE !!
How to Hack the Windows Admin Password Using OphCrack in Backtrack tutorial
Hacking With Keyloggers Prorat
How to Get Unlimited time in an Internet Cafe ... :D
Cracking a WPA/WPA-2 Password.. ;)
How to Hack Websites & Servers - Tutorial
Backtrack and Facebook
Credit Card Generating Sequence
Keywords
netcat
Facebook Like
Similar topics

Share | 
 

 What is Foot Printing ?

View previous topic View next topic Go down 
AuthorMessage
The Joker
Admin
Admin
avatar

Posts : 182
Join date : 2012-06-11
Age : 26

PostSubject: What is Foot Printing ?   Sat Aug 18, 2012 8:11 am

Defining Foot printing

* Foot printing is the blueprinting of the security profile of an organization, undertaken in a methodological manner.
*Foot printing is one of the three pre-attack phases. The others are scanning and enumeration.
*Foot printing results in a unique organization profile with respect to networks (Internet / Intranet / Extra net / Wireless) and systems involved.

There is no single methodology for foot printing, as a hacker can choose several routes to trace the information. Foot printing therefore, needs to be carried out precisely and in an organized manner. The information unveiled at various network levels can include details of domain name, network blocks, network services and applications, system architecture, intrusion detection systems, specific IP addresses, access control mechanisms and related lists, phone numbers, contact addresses, authentication mechanisms and system enumeration.

The information gathering activity can be broadly divided into seven phases:

o The attacker would first unearth initial information (such as domain name),
o locate the network range of the target system (using tools such as Nslookup, whois etc),
o ascertain the active machines (for instance by pinging the machine),
o discover open ports or access points (using tools such as port scanners),
o detect operating systems (for instance querying with telnet),
o uncover services on ports and
o ultimately map the network.

This not only speeds up the real attack process, but also aids in helping the attacker prepare better for covering his tracks and thereby leave a smaller or minimal footprint.

Initial Information Commonly includes:

*Domain name lookup
*Locations
*Contacts (Telephone / mail)

Information Sources:

o Open source
o Who is
o Nslookup

Hacking Tool: Sam Spade

Open Source Foot printing is the easiest and safest way to go about finding information about a company. Information that is available to the public, such as phone numbers, addresses, etc. Performing whois requests, searching through DNS tables are other forms of open source foot printing. Most of this information is fairly easy to get, and within legal limits. One easy way to check for sensitive information is to check the HTML source code of the website to look for links, comments, Meta tags etc

___________________________________________________
Do NOT PM me until you are DONATING or Your Upgrade  hasn't been completed even after you have purchased it .
If is one of the above, you can either choose to PM or mail me ..
Back to top Go down
View user profile http://teamiha.tumblr.com
 
What is Foot Printing ?
View previous topic View next topic Back to top 
Page 1 of 1
 Similar topics
-
» selecting dropdown list using selenium
» Here we go again (my dad's foot!)
» 21 Foot Rule

Permissions in this forum:You cannot reply to topics in this forum
Ethical Experts :: Hacking Section :: Hacking Tutorials-
Jump to: