wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Footprinting

profile
Abhishek Jaiswal
Jul 08, 2022
2 Likes
1 Discussions
74 Reads

Footprinting is the technique to collect as much information as possible about the targeted network/victim/system. It helps hackers in various ways to intrude on an organization's system. Footprinting can be active as well as passive. Passive footprinting/pseudonymous footprinting involves collecting data without the owner knowing that hackers gather their data. In contrast, active footprints are created when personal data gets released consciously and intentionally or by the owner's direct contact.

 

Some branches of footprinting : 

  • Open-Source Footprinting.
  • Network-based Footprinting.
  • DNS Interrogation.

 

Open-Source Footprinting : 

This type of footprinting is the safest, holding all legal limitations, and hackers can do it without fear because it is legal and, hence, coined the term Open-source. Examples of this type include: finding someone's email address and phone numbers, scanning IP through automated tools, searching for age, DOB, house address, etc. Most companies provide information about themselves on their official website without knowing that hackers can take advantage of it.

 

Network-based Footprinting : 

Using this footprinting category, hacktivists can retrieve information such as user name, information within a group, shared data among individuals, network services, etc.

 

DNS Interrogation : 

After gathering the information from the different areas using various techniques, the hacker usually queries the DNS using pre-existing tools. Many freeware tools are available online to perform DNS interrogation


Comments ()


Sign in

Read Next

File management -disha parekh

Blog banner

I/O Management and Disk Scheduling

Blog banner

DURGA POOJA

Blog banner

Zomato's Secret Digital Marketing Techniques!

Blog banner

Mango Raisin Chutney (sweet mango raisin spread)

Blog banner

Memory Partitioning

Blog banner

Why Time Management Is the Secret to College Success (and How to Master It)

Blog banner

How Reading Books Shape a Child’s Imagination and Thinking?

Blog banner

Hello World

Blog banner

A Short History of GIS

Blog banner

Starvation and Deadlock.

Blog banner

Platonic Solids

Blog banner

Data Science & AI

Blog banner

Buffering

Blog banner

Never give up

Blog banner

SQL Injection Techniques

Blog banner

NodeJs

Blog banner

WAKE UP ITS FOOD o'CLOCK...!!!!!

Blog banner

Expert System In AI

Blog banner

Virtual Memory

Blog banner

Tracking Emails & Email Crimes

Blog banner

child Labour

Blog banner

File management

Blog banner

Uniprocessor and Types

Blog banner

Digital Footprints An Emerging Dimension of Digital Inequality

Blog banner

APACHE KAFKA

Blog banner

The Joy of Giving: How Festivals Teach Children Empathy and Gratitude

Blog banner

Denial-of-Service and Distributed Denial-of-Service Attack Techniques

Blog banner

What is Virtual Memory

Blog banner

The Peephole

Blog banner

Cache memory

Blog banner

Data Visualization – Importance and tools (Tableau, Power BI)

Blog banner

A True Friendship

Blog banner

Mariana Trench: The deepest depths

Blog banner

Music helps reduce stress

Blog banner

objectives and function of operating system

Blog banner

E-learning in today's world

Blog banner

10 Amazing facts about Tokyo Ghoul

Blog banner

A Heartfelt Act of Kindness

Blog banner

Challenges of Digital forensics in cloud computing environment

Blog banner

Introduction my self

Blog banner

Kernel in Operating System

Blog banner