wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Footprinting

profile
Abhishek Jaiswal
Jul 08, 2022
2 Likes
1 Discussions
74 Reads

Footprinting is the technique to collect as much information as possible about the targeted network/victim/system. It helps hackers in various ways to intrude on an organization's system. Footprinting can be active as well as passive. Passive footprinting/pseudonymous footprinting involves collecting data without the owner knowing that hackers gather their data. In contrast, active footprints are created when personal data gets released consciously and intentionally or by the owner's direct contact.

 

Some branches of footprinting : 

  • Open-Source Footprinting.
  • Network-based Footprinting.
  • DNS Interrogation.

 

Open-Source Footprinting : 

This type of footprinting is the safest, holding all legal limitations, and hackers can do it without fear because it is legal and, hence, coined the term Open-source. Examples of this type include: finding someone's email address and phone numbers, scanning IP through automated tools, searching for age, DOB, house address, etc. Most companies provide information about themselves on their official website without knowing that hackers can take advantage of it.

 

Network-based Footprinting : 

Using this footprinting category, hacktivists can retrieve information such as user name, information within a group, shared data among individuals, network services, etc.

 

DNS Interrogation : 

After gathering the information from the different areas using various techniques, the hacker usually queries the DNS using pre-existing tools. Many freeware tools are available online to perform DNS interrogation


Comments ()


Sign in

Read Next

INTERNET

Blog banner

EVOLUTION OF MICROPROCESSOR

Blog banner

E-learning

Blog banner

Swiggi

Blog banner

CYBERPEACEKEEPING: NEW WAYS TO PREVENT AND MANAGE CYBERATTACKS

Blog banner

Data Mining

Blog banner

Women empowerment

Blog banner

Anomaly Detection in Behavioral Data Using Machine Learning

Blog banner

Docker Framework

Blog banner

RAID and It's Levels

Blog banner

Senseless Teeths

Blog banner

Hey Aryan here

Blog banner

Riddhi Miyani 53003220140

Blog banner

MAJOR ACHIEVEMENTS OF OS

Blog banner

Threats To Computer System

Blog banner

Social Network Analysis: Ek Naya Nazariya Data Science Mein

Blog banner

Importance of business process documentation

Blog banner

This Windows 11 encryption bug may cause data damage

Blog banner

Facebook marketing

Blog banner

Cache memory

Blog banner

Brain wash of social media

Blog banner

Linux Virtual Machine Process Scheduling

Blog banner

Deadlock and Starvation in an Operating System

Blog banner

Sniffing: A Cyber Security Threat

Blog banner

Consumer to consumer business mode

Blog banner

Data Mapping

Blog banner

Protect yourself from System Hacking with these Simple Steps

Blog banner

I/O Management and Disk Scheduling

Blog banner

Emailing the merger document

Blog banner

A Survey of Anti-Forensic Techniques: Methods, Challenges, and Countermeasures

Blog banner

Cache Memory

Blog banner

Top 10 Logos and their meanings

Blog banner

Segmentation and paging concept

Blog banner

Principles of Service Operation

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Current Trends in GIS and Remote Sensing(Ocean Applications)

Blog banner

Deadlock and Starvation

Blog banner

Outlook mail

Blog banner

Data Science in Everyday Life (like a phone, shopping cart, or social media icons)

Blog banner

Deadlock

Blog banner

ACHIEVEMENTS IN OPERATING SYSTEMS

Blog banner

The Impact of Tolerances and Wall Thickness on Pipeline Integrity

Blog banner