What Is Footpriting?
- Footpriting is the process of collecting as much information as possible about a traget network, for Identify various ways to intrude into an organization's network system.
- Footprting is the first step of any attack on information system, attacker gather publicly avaible sensitive information, using which he/she perform social engineering system and network attacks, etc. that lead to huge financial loss and loss of business reputation
Objective of Footpriting
1. Collect Network Information
- Domain Name
- Internal Domain Name
- Networks Blocks
- IP Address Of the reachable System
- Rogue Website/Private website
- TCP And UDP Service Running
- Access Control Mechanism and ACL's
- Networks Protocols
- VPN Points
- IDSes Running
- Analog/digital Telephone Number
- System Enumeration
2. Collect System Information
- User and group Name
- Routing Tables
- SNMAP Information
- System Architeture
- Remote System Type
- System Names
- Passwords
3. Collect Organization's Information
- Employee details
- organization's Website
- Company Directory
- Location Details
- Address and phone Number
- Comments In HTML Source Code
- Security Policies Implemented
- Web Server Links relevant to the Organization
- Background Of the Orgainzation
- Background of the Organization
- News Articles
- Press Releases
Footprinting Methodology
- Footprinting Through Search Engine
- Footprinting Using Advanced Google Hacking Techniques
- Footprinting Throught Social Networking Sites
- Website Footprinting
- Email Footprinting
- Competitive Intelligence
- WhoIs Footpriting
- DNS Footprinting
- Network Footprinting
- Footpriting Throught Social Engineering
For More Information Download The PDF To Learn In Details:-https://clk.ink/t5Ys
Top 5 Website To Learn Ethical Hacking:-https://clk.ink/D2T6p
Top 5 Website To Learn Ethical Hacking:-https://clk.ink/D2T6p
Complete Carding Course:- https://clk.ink/jlneiHr
Best For Product to buy online:-
1. Mi PowerBank:- https://amzn.to/2ElFHbN
2. Mi PowerBank2:- https://amzn.to/2Ekh3s8
Note:- 1.These are only for education purpose i am not responsible for any illage activity.
2. For any querry, content and anything you want just mail me at:-Way2Hacks
Credit:- @Prince_tech
Join with us on telegram:-https://t.me/joinchat/AAAAAEjlhM7dRhGc5vWirw
Join me On whatshapp for free Ethical Hacking Course:- https://chat.whatsapp.com/Cw8yUqtsF3JAVumLVib1dH
Join me on whatshapp:-https://chat.whatsapp.com/Lcpa5f11gF3JZxFsn4pWLo
Follow us on Instagram:-https://www.instagram.com/way2hacks/
#Stay Tuned
#Exclusive
#New
Copy with Credits
@☠🔰 Prince_saini🔰☠
☠💀Nothing is Impossible in front of me💀☠
#Exclusive
#New
Copy with Credits
@☠🔰 Prince_saini🔰☠
☠💀Nothing is Impossible in front of me💀☠
3 Comments
This is a wonderful article, Given so much info in it, These type of articles keeps the users interest in the website, and keep on sharing more ... good luck.
ReplyDeleteEthical hacking Online Training
NfilatPcan_to_Little Rock Brody Fokused https://wakelet.com/wake/0xfLUa6GJ8K3O5XAlJ_HZ
ReplyDeletegritapbrownez
pemulQsterra Sharon Cook Eset NOD 32
ReplyDeleteKaspersky Total Security
Adobe Audition
ligangtergder
Thanks For Your Feedback. Reply with in 2-3 days