Ethical hacking - Footprinting.pptx

N
Nargis ParveenAsst. professor
FOOT PRINTING AND RECONNAISSANCE
INTRODUCTION OF FOOTPRINTING
Footprinting is an ethical hacking technique used to gather as much data as possible about a specific
targeted computer system, an infrastructure and networks to identify opportunities to penetrate
them. It is one of the best methods of finding vulnerabilities.
The process of cybersecurity footprinting involves profiling organizations and collecting data about
the network, host, employees and third-party partners. This information includes the OS used by the
organization, firewalls, network maps, IP addresses, domain name system information, security
configurations of the target machine, URLs, virtual private networks, staff IDs, email addresses and
phone numbers.
Types of Footprints
a) Active Footprinting: It means performing footprinting by getting
indirect touch with target machine.
b) Passive Footprinting: It means collecting information about a system
located at remote distance from the attacker
What is active & passive footprinting?
Active footprinting describes the process of using tools and techniques, like using
the traceroute commands or a ping sweep -- Internet Control Message Protocol sweep -- to
collect data about a specific target. This often triggers the target's intrusion detection system
(IDS). It takes a certain level of stealth and creativity to evade detection successfully.
 Passive footprinting involves collecting data about a specific target using innocuous methods,
like performing a Google search, looking through Archive.org, using NeoTrace, browsing through
employees' social media profiles, looking at job sites and using Whois, a website.
Ethical hacking - Footprinting.pptx
What Information Is Collected in Footprinting?
The goal of footprinting is to gather as much information about the target as possible in order to
increase the likelihood of success when actually planning and executing an attack. This includes
identifying any security weaknesses and gathering contact information for system administrators
and other users who may access sensitive data. During footprinting, various types of information
may be collected
 OS used by the organization,
 firewalls, network maps,
 IP addresses,
 domain name system information,
 security configurations of the target machine,
 URLs, virtual private networks, staff IDs,
 email addresses and phone numbers.
Digital footprint examples
Social media sites
• Social media credentials connecting other websites
• Posting pictures and sharing data on social accounts
• Communicating with friends and other contacts
Online Banking
• Use of a mobile application for online banking
• Getting subscriptions to blogs and financial publications
• Requesting a credit card account
Health
• Use of fitness trackers and wearable tech
• Using an email address for a gym registration
• Getting a subscription to health and fitness blogs
What are the steps of footprinting?
Information gathering.
Determining the range of the network.
Identifying active machines.
Identifying open ports and access points.
OS fingerprinting.
Fingerprinting services.
Mapping the network.
Advantages of Footprinting
1) It allows hackers to gather the basic security configurations of target machine.
2) It is best method of vulnerabilities.
3) By using this hacker identify as to which attacker is handier to hack the target system.
1 sur 9

Recommandé

Module 2   Foot PrintingModule 2   Foot Printing
Module 2 Foot Printingleminhvuong
8.2K vues38 diapositives
FootprintingFootprinting
FootprintingDuah John
570 vues9 diapositives

Contenu connexe

Tendances(20)

CSRF BasicsCSRF Basics
CSRF Basics
n|u - The Open Security Community3.9K vues
Setting up CSIRTSetting up CSIRT
Setting up CSIRT
APNIC5.9K vues
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
FellowBuddy.com3.2K vues
Cyber securityCyber security
Cyber security
Dr. Kishor Nikam692 vues
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
Nitesh Dubey274 vues
Social engineering attacksSocial engineering attacks
Social engineering attacks
Ramiro Cid5.8K vues
Computer securityComputer security
Computer security
Shashi Chandra2K vues
UTM Unified Threat ManagementUTM Unified Threat Management
UTM Unified Threat Management
Lokesh Sharma2.7K vues
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security
Lokender Yadav2.5K vues
Owasp top 10Owasp top 10
Owasp top 10
YasserElsnbary427 vues
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptx
ANIKETKUMARSHARMA3319 vues
Ethical HackingEthical Hacking
Ethical Hacking
BugRaptors1K vues
Cyber crime & securityCyber crime & security
Cyber crime & security
Ronson Fernandes3.6K vues

Dernier(20)

AI Tools for Business and StartupsAI Tools for Business and Startups
AI Tools for Business and Startups
Svetlin Nakov57 vues
Education and Diversity.pptxEducation and Diversity.pptx
Education and Diversity.pptx
DrHafizKosar56 vues
231112 (WR) v1  ChatGPT OEB 2023.pdf231112 (WR) v1  ChatGPT OEB 2023.pdf
231112 (WR) v1 ChatGPT OEB 2023.pdf
WilfredRubens.com100 vues
Structure and Functions of Cell.pdfStructure and Functions of Cell.pdf
Structure and Functions of Cell.pdf
Nithya Murugan142 vues
SIMPLE PRESENT TENSE_new.pptxSIMPLE PRESENT TENSE_new.pptx
SIMPLE PRESENT TENSE_new.pptx
nisrinamadani2146 vues
Material del tarjetero LEES Travesías.docxMaterial del tarjetero LEES Travesías.docx
Material del tarjetero LEES Travesías.docx
Norberto Millán Muñoz57 vues
ACTIVITY BOOK key water sports.pptxACTIVITY BOOK key water sports.pptx
ACTIVITY BOOK key water sports.pptx
Mar Caston Palacio132 vues
Class 10 English  lesson plansClass 10 English  lesson plans
Class 10 English lesson plans
Tariq KHAN172 vues
Dance KS5 BreakdownDance KS5 Breakdown
Dance KS5 Breakdown
WestHatch52 vues
CWP_23995_2013_17_11_2023_FINAL_ORDER.pdfCWP_23995_2013_17_11_2023_FINAL_ORDER.pdf
CWP_23995_2013_17_11_2023_FINAL_ORDER.pdf
SukhwinderSingh895865467 vues
Azure DevOps Pipeline setup for Mule APIs #36Azure DevOps Pipeline setup for Mule APIs #36
Azure DevOps Pipeline setup for Mule APIs #36
MysoreMuleSoftMeetup75 vues
ICS3211_lecture 08_2023.pdfICS3211_lecture 08_2023.pdf
ICS3211_lecture 08_2023.pdf
Vanessa Camilleri68 vues
Drama KS5 BreakdownDrama KS5 Breakdown
Drama KS5 Breakdown
WestHatch50 vues
STYP infopack.pdfSTYP infopack.pdf
STYP infopack.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego143 vues

Ethical hacking - Footprinting.pptx

  • 1. FOOT PRINTING AND RECONNAISSANCE
  • 2. INTRODUCTION OF FOOTPRINTING Footprinting is an ethical hacking technique used to gather as much data as possible about a specific targeted computer system, an infrastructure and networks to identify opportunities to penetrate them. It is one of the best methods of finding vulnerabilities. The process of cybersecurity footprinting involves profiling organizations and collecting data about the network, host, employees and third-party partners. This information includes the OS used by the organization, firewalls, network maps, IP addresses, domain name system information, security configurations of the target machine, URLs, virtual private networks, staff IDs, email addresses and phone numbers.
  • 3. Types of Footprints a) Active Footprinting: It means performing footprinting by getting indirect touch with target machine. b) Passive Footprinting: It means collecting information about a system located at remote distance from the attacker
  • 4. What is active & passive footprinting? Active footprinting describes the process of using tools and techniques, like using the traceroute commands or a ping sweep -- Internet Control Message Protocol sweep -- to collect data about a specific target. This often triggers the target's intrusion detection system (IDS). It takes a certain level of stealth and creativity to evade detection successfully.  Passive footprinting involves collecting data about a specific target using innocuous methods, like performing a Google search, looking through Archive.org, using NeoTrace, browsing through employees' social media profiles, looking at job sites and using Whois, a website.
  • 6. What Information Is Collected in Footprinting? The goal of footprinting is to gather as much information about the target as possible in order to increase the likelihood of success when actually planning and executing an attack. This includes identifying any security weaknesses and gathering contact information for system administrators and other users who may access sensitive data. During footprinting, various types of information may be collected  OS used by the organization,  firewalls, network maps,  IP addresses,  domain name system information,  security configurations of the target machine,  URLs, virtual private networks, staff IDs,  email addresses and phone numbers.
  • 7. Digital footprint examples Social media sites • Social media credentials connecting other websites • Posting pictures and sharing data on social accounts • Communicating with friends and other contacts Online Banking • Use of a mobile application for online banking • Getting subscriptions to blogs and financial publications • Requesting a credit card account Health • Use of fitness trackers and wearable tech • Using an email address for a gym registration • Getting a subscription to health and fitness blogs
  • 8. What are the steps of footprinting? Information gathering. Determining the range of the network. Identifying active machines. Identifying open ports and access points. OS fingerprinting. Fingerprinting services. Mapping the network.
  • 9. Advantages of Footprinting 1) It allows hackers to gather the basic security configurations of target machine. 2) It is best method of vulnerabilities. 3) By using this hacker identify as to which attacker is handier to hack the target system.