Cyber Security

  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • MOBILE
  • COMPUTER
  • NETWORKING
  • HACKING
  • OTHER
    • TECH HACK
    • SOCIAL MEDIA TRICKS
    • TECHNICAL KNOWLEDGE

What Is Footprinting | Types Of Footprinting

Author: yadram | On:24th Oct, 2020| Comments: 0

Table of Contents

  • What is Footprinting:-
  • Types of Footprinting:-
    •  Internal Footprinting:-
      • Dumpster Diving:-
      • Shoulder surfing:-
      • Private Website:-
    • External Footprinting:-
      • Website:-
      • Google:-
      • Whois:-
      • Domain Name Server:-
      • Social Networking:-
      • Social Engineering:-
      • Archive Websites:-
    • Footprinting Using Tools:-
      • Ping :-
      • nsLookup:-

What is Footprinting:-

(What Is Footprinting | Types Of Footprinting) | Footprinting is first phase in hacking.In this collection of data it is possible that the information that is commonly found may contain critical pollution. Using an action attacker can collect information such as emails, contacts, domain name information and use of social engineering very sensitive data.

Types of Footprinting:-

There are two types.

  1. Internal Footprinting
  2. External Footprinting

 Internal Footprinting:-

In-foot footprint is known as internal footprint.In footprint, the attack can reach the internal network or be directly or indirectly connected to the internal network.

Following attacks or mechanism can be used for internal footprinting:

Dumpster Diving:-

Searching for sensitive information in garbage or dumping sites is known as dumpster diving. In some cases, the attacker may obtain a piece of paper or other important documents from which sensitive information can be obtained. When penetration testing or hacking is performed each and every possible aspect of gathering information is taken into consideration.

Shoulder surfing:-

A look on the shoulder or a guess of a password by watching a person type or indirectly with the palm of their hand to retrieve a password. Sometimes it provides very sensitive information.

Private Website:-

If an attacker finds any secret target websites, it has been valuable to him as he can get a lot of sensitive information like employee and client details etc.

Also Read:-

  • What Is AI? | Artificial Intelligence Kya Hai?
  • 6 Facebook Privacy Settings You Should Change Now [2020]

External Footprinting:-

When attacker is not connected to the target network, in order to gather information, external footprinting is used.

Generally, External Footprinting provides a large number of information about the data. There are lots of ways and possibilities to gather the information  from outside of network.

Tracking of attacks or equipment may be used to capture external measures:

Website:-

The target website may contain some sensitive information or may be compromised. From the website, attacker can easily get the contact details like e-mails and phone numbers.

Using phone numbers, attacker can simply call and perform social engineering in order to gain sensitive information beside, attacker can also perform social engineering over e-mails.

Also Read:-

  • Introducation to Hacking | Types Of Hackers? | Phases of Hacking?
  • Introducation to Ports And Protocols | important networking terms

Google:-

Google is one of the largest search engines for and hacking criminals. Alternatively targeted information may provide sensitive information such as administrator content or about targeted profiles on social media.

Google help both actively and passively in gaining sensitive information. In the meantime, if you google on XYZ, you can find his photo, his address, upcoming events or more sensitive information about the target

Whois:-

Whois is a tool used to collect information about a targeted domain such as a name server, domain records, admin contacts and other related information.

whois is one the major information provides and this information is used in writing pentration testing reports. It is a great database which contains records of almost every domain name.

Also Read:-

  • How to Get Your Personal Loan Approved | Personal Loan Approved Easily
  • 18 CMD Tricks and Tips | Command Prompt | CMD Amazing Hack 2020

Domain Name Server:-

DNS Footprinting can provides information same as of whois, sometimes attacker get sensitive information which lead to compromise of Domain of target.

Social Networking:-

Public profiles on social network contain contact informaion and activity details. Target may be social engineering easily over networking which lead to disclosure of sensitive information.

Social Engineering:-

Social engineering is art of human exploitation. It is another major attack that has led to a dramatic increase. Social engineering can be used as a tool or based on people.

Also Read:-

  • How To Create People Card On Google | Virtual Visiting Card
  • Three Essential Digital Marketing Channels In 2020 | Marketing Channels

In tool based social engineering, tool like Phising, tabnapping and social Engineering toolkits are used. In human based social engineering, manipulating the target is used to gain sensitive information like client details, password, etc.

Archive Websites:-

There are some website over internet which keeps archives of almost every websites. Looking in archive can provide sensitive information about the target. The backing machine is one of the web-based website archives.

Footprinting Using Tools:-

Ping :-

Ping is a command line tool used to identify a live target or not Only when the target is live, continuous exploitation can be done.

What Is Footprinting | Types Of Footprinting

Also Read:-

  • How does Satellite Television work? | Satellite TV
  • What Is RPA (Robotic Process Automation) ? | Benefits Of RPA

nsLookup:-

nsLookup is a command line tool used to collect information about the target server name.

What Is Footprinting | Types Of Footprinting

 

I hope you liked this What Is Footprinting | Types Of Footprinting post my lady.
If you want to get a similar post, then subscribe to us.

 

Thank you for your valuable time..

 

Please Share
Previous Post
Next Post

Reader Interactions

  • Types of Network Devices | Basic Devices for Networking

    Types of Network Devices | Basic Devices for Networking

  • Top 5 Best Network Card 2021 | Comparison of Best Network Card

    Top 5 Best Network Card 2021 | Comparison of Best Network Card

  • Advantages of fiber Optics? Fiber Optics Working

    Advantages of fiber Optics? Fiber Optics Working

  • How to Hack Facebook Account in 2021

    How to Hack Facebook Account in 2021

  • What is Ethical Hacking?  |  Vulnerability Management Tools

    What is Ethical Hacking? | Vulnerability Management Tools

  • How to Hack Instagram Account 2021

    How to Hack Instagram Account 2021

Leave a Reply Cancel reply

Primary Sidebar

Follow on Social media

Latest Post

  • Types of Network Devices | Basic Devices for Networking
  • Top 5 Best Network Card 2021 | Comparison of Best Network Card
  • Advantages of fiber Optics? Fiber Optics Working
  • How to Hack Facebook Account in 2021
  • What is Ethical Hacking? | Vulnerability Management Tools

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Categories

  • COMPUTER TRICKS (23)
  • HACKING (20)
  • MOBILE TECHNOLOGY (23)
  • NETWORKING (14)
  • SOCIAL MEDIA TRICKS (40)
  • TECH HACK (41)
  • TECHNICAL KNOWLEDGE (25)

Pages

  • Contact Us
  • Home
  • Disclaimer
  • About me
  • privacy Policy
  • Term and conditions
  • Networking
  • Blog

Footer

About Me

My name is yadram agnihotri. I have created this blog to connect everyone with technology. In this, through my little knowledge, I keep updating daily about social media tricks, tech hack, computer tricks, technical knowledge and mobile technology. So that everyone should be connected with technology. Read More…

yadram: View My Blog Posts

Categories

  • COMPUTER TRICKS (23)
  • HACKING (20)
  • MOBILE TECHNOLOGY (23)
  • NETWORKING (14)
  • SOCIAL MEDIA TRICKS (40)
  • TECH HACK (41)
  • TECHNICAL KNOWLEDGE (25)

Pages

  • About me
  • Blog
  • Contact Us
  • Disclaimer
  • Home
  • Networking
  • privacy Policy
  • Term and conditions
Copyright ©2020 Cyber Security