Table of Contents
What is Footprinting:-
(What Is Footprinting | Types Of Footprinting) | Footprinting is first phase in hacking.In this collection of data it is possible that the information that is commonly found may contain critical pollution. Using an action attacker can collect information such as emails, contacts, domain name information and use of social engineering very sensitive data.
Types of Footprinting:-
There are two types.
- Internal Footprinting
- External Footprinting
Internal Footprinting:-
In-foot footprint is known as internal footprint.In footprint, the attack can reach the internal network or be directly or indirectly connected to the internal network.
Following attacks or mechanism can be used for internal footprinting:
Dumpster Diving:-
Searching for sensitive information in garbage or dumping sites is known as dumpster diving. In some cases, the attacker may obtain a piece of paper or other important documents from which sensitive information can be obtained. When penetration testing or hacking is performed each and every possible aspect of gathering information is taken into consideration.
Shoulder surfing:-
A look on the shoulder or a guess of a password by watching a person type or indirectly with the palm of their hand to retrieve a password. Sometimes it provides very sensitive information.
Private Website:-
If an attacker finds any secret target websites, it has been valuable to him as he can get a lot of sensitive information like employee and client details etc.
Also Read:-
- What Is AI? | Artificial Intelligence Kya Hai?
- 6 Facebook Privacy Settings You Should Change Now [2020]
External Footprinting:-
When attacker is not connected to the target network, in order to gather information, external footprinting is used.
Generally, External Footprinting provides a large number of information about the data. There are lots of ways and possibilities to gather the information from outside of network.
Tracking of attacks or equipment may be used to capture external measures:
Website:-
The target website may contain some sensitive information or may be compromised. From the website, attacker can easily get the contact details like e-mails and phone numbers.
Using phone numbers, attacker can simply call and perform social engineering in order to gain sensitive information beside, attacker can also perform social engineering over e-mails.
Also Read:-
- Introducation to Hacking | Types Of Hackers? | Phases of Hacking?
- Introducation to Ports And Protocols | important networking terms
Google:-
Google is one of the largest search engines for and hacking criminals. Alternatively targeted information may provide sensitive information such as administrator content or about targeted profiles on social media.
Google help both actively and passively in gaining sensitive information. In the meantime, if you google on XYZ, you can find his photo, his address, upcoming events or more sensitive information about the target
Whois:-
Whois is a tool used to collect information about a targeted domain such as a name server, domain records, admin contacts and other related information.
whois is one the major information provides and this information is used in writing pentration testing reports. It is a great database which contains records of almost every domain name.
Also Read:-
- How to Get Your Personal Loan Approved | Personal Loan Approved Easily
- 18 CMD Tricks and Tips | Command Prompt | CMD Amazing Hack 2020
Domain Name Server:-
DNS Footprinting can provides information same as of whois, sometimes attacker get sensitive information which lead to compromise of Domain of target.
Social Networking:-
Public profiles on social network contain contact informaion and activity details. Target may be social engineering easily over networking which lead to disclosure of sensitive information.
Social Engineering:-
Social engineering is art of human exploitation. It is another major attack that has led to a dramatic increase. Social engineering can be used as a tool or based on people.
Also Read:-
- How To Create People Card On Google | Virtual Visiting Card
- Three Essential Digital Marketing Channels In 2020 | Marketing Channels
In tool based social engineering, tool like Phising, tabnapping and social Engineering toolkits are used. In human based social engineering, manipulating the target is used to gain sensitive information like client details, password, etc.
Archive Websites:-
There are some website over internet which keeps archives of almost every websites. Looking in archive can provide sensitive information about the target. The backing machine is one of the web-based website archives.
Footprinting Using Tools:-
Ping :-
Ping is a command line tool used to identify a live target or not Only when the target is live, continuous exploitation can be done.
Also Read:-
- How does Satellite Television work? | Satellite TV
- What Is RPA (Robotic Process Automation) ? | Benefits Of RPA
nsLookup:-
nsLookup is a command line tool used to collect information about the target server name.
I hope you liked this What Is Footprinting | Types Of Footprinting post my lady.
If you want to get a similar post, then subscribe to us.
Thank you for your valuable time..
Leave a Reply