Footprinting is the process of gathering information about a target organization or system in order to identify potential vulnerabilities that can be exploited during an attack. It is an important step in the planning phase of a penetration test or a cyber attack. two types of footprinting 1. active footprinting 2. passive footprinting.
- Network footprinting: This involves gathering information about the target organization's network infrastructure, including IP addresses, DNS server information, and open ports.
- Social engineering: This involves using psychological tactics to gather information from people within the target organization. This could include phishing emails or phone calls to gather information from employees.
- Publicly available information: This includes information that can be found on the internet, such as company websites, social media profiles, and press releases.
- OSINT: Open-source intelligence gathering, this includes using a wide range of techniques to gather information from publicly available sources such as company websites, social media, forums, and search engines.
- Network scanning: This involves using tools to scan the target organization's network for open ports, services, and vulnerabilities.
1. Active Footprinting
direct interaction to target system and information gathering like social media and another source.
Active footprinting techniques
social media |
website |
another platform |
search engine |
Passive Footprinting
information gathering about target without direct interaction, Target doesn't know someone is gathering its information.
Passive footprinting techniques
nmap |
email tracker |
different footprinting tools |
No comments:
Post a Comment
Tell us how you like it.