News

FootPrinting-First Step Of Ethical Hacking

Footprinting is a first step that a penetration tester used to evaluate the security of any IT infrastructure, footprinting means to gather the maximum information about the computer system or a network and about the devices that are attached to this network. 

Footprinting is a first and the important step because after this a penetration tester know how the hacker sees this network.
To measure the security of a computer system, it is good to know more and more as you can because after this you will able to determine the path that a hacker will use to exploit this network.



This is the basic block diagram which shows the steps that are include in the penetration testing methodology, in this article we will discuss the first one that is footprinting. The EC-Council divides footprinting and scanning into seven basic steps. These include

1. Information gathering
2. Determining the network range
3. Identifying active machines
4. Finding open ports and access points
5. OS fingerprinting
6. Fingerprinting services
7. Mapping the network

Information of a organisation means to finding these:
Internet: Domain name, network blocks, IP addresses open to Net, TCP and UDP services running, ACLs, IDSes
Intranet: Protocols (IP,NETBIOS), internal domain names, etc
Remote Access: Phone numbers, remote control, telnet, authentication
Extranet: Connection origination, destination, type, access control  
Website on an organisation is a first place from where penetration testing start, you can get the sensitive information about the network by using websites, you can get Phone Numbers, Contact Names, E-mail Addresses, and Personal Details. Beside the official website of the company an attacker might be use some social networking website like facebook to gather the appropriate information. Some other resources and a website that an attacker may use to get the maximum information about the organisation and it employees are:

zabasearch.com—Contains names, addresses, phone numbers, date of birth, and other information about individuals.
anywho.com—Phone book offering forward and reverse lookups.
maps.yahoo.com—Yahoo! map site. 
You can use the facility of a search engine to perform footprinting,search engine like google, yahoo or altavista provide the plate form to gather the information. Advance google dorks may be use to get the information like:
Filetype: This operator directs Google to search only within the test of a particular type of file.
        Example: filetype:xls

Inurl: This operator directs Google to search only within the specified URL of a document.
     Example: inurl:search-text

Link: The link operator directs Google to search within hyperlinks for a specific term.
    Example link:www.domain.com

Intitle: The intitle operator directs Google to search for a term within the title of a document.
       Example intitle: “Index of...etc”



Note: If you enjoyed this post, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
FootPrinting-First Step Of Ethical Hacking Reviewed by Ethical Hacking on 12:07 PM Rating: 5

4 comments:

  1. Nice post. So you back to basics again

    ReplyDelete
  2. Not necessarily, we have decided to write about the basic ethical hacking skills beside tools and tricks.

    ReplyDelete
  3. Good intro to footprinting. A new site - http://dnsdumpster.com has an all in one footprint report on a domain name.

    ReplyDelete
  4. The article is very helpful. especially like me who was just learning the internet, this is very helpful. thank you for everything. This extraordinary article

    ReplyDelete

Feel free to ask questions, we love to respond.

All Rights Reserved by The World of IT & Cyber Security: ehacking.net © 2014 - 2015
Powered By Blogger, Designed by Sweetheme

Contact Form

Name

Email *

Message *

Powered by Blogger.