Ethical hacking - Footprinting.pptx

N
Nargis ParveenAsst. professor
FOOT PRINTING AND RECONNAISSANCE
INTRODUCTION OF FOOTPRINTING
Footprinting is an ethical hacking technique used to gather as much data as possible about a specific
targeted computer system, an infrastructure and networks to identify opportunities to penetrate
them. It is one of the best methods of finding vulnerabilities.
The process of cybersecurity footprinting involves profiling organizations and collecting data about
the network, host, employees and third-party partners. This information includes the OS used by the
organization, firewalls, network maps, IP addresses, domain name system information, security
configurations of the target machine, URLs, virtual private networks, staff IDs, email addresses and
phone numbers.
Types of Footprints
a) Active Footprinting: It means performing footprinting by getting
indirect touch with target machine.
b) Passive Footprinting: It means collecting information about a system
located at remote distance from the attacker
What is active & passive footprinting?
Active footprinting describes the process of using tools and techniques, like using
the traceroute commands or a ping sweep -- Internet Control Message Protocol sweep -- to
collect data about a specific target. This often triggers the target's intrusion detection system
(IDS). It takes a certain level of stealth and creativity to evade detection successfully.
 Passive footprinting involves collecting data about a specific target using innocuous methods,
like performing a Google search, looking through Archive.org, using NeoTrace, browsing through
employees' social media profiles, looking at job sites and using Whois, a website.
Ethical hacking - Footprinting.pptx
What Information Is Collected in Footprinting?
The goal of footprinting is to gather as much information about the target as possible in order to
increase the likelihood of success when actually planning and executing an attack. This includes
identifying any security weaknesses and gathering contact information for system administrators
and other users who may access sensitive data. During footprinting, various types of information
may be collected
 OS used by the organization,
 firewalls, network maps,
 IP addresses,
 domain name system information,
 security configurations of the target machine,
 URLs, virtual private networks, staff IDs,
 email addresses and phone numbers.
Digital footprint examples
Social media sites
• Social media credentials connecting other websites
• Posting pictures and sharing data on social accounts
• Communicating with friends and other contacts
Online Banking
• Use of a mobile application for online banking
• Getting subscriptions to blogs and financial publications
• Requesting a credit card account
Health
• Use of fitness trackers and wearable tech
• Using an email address for a gym registration
• Getting a subscription to health and fitness blogs
What are the steps of footprinting?
Information gathering.
Determining the range of the network.
Identifying active machines.
Identifying open ports and access points.
OS fingerprinting.
Fingerprinting services.
Mapping the network.
Advantages of Footprinting
1) It allows hackers to gather the basic security configurations of target machine.
2) It is best method of vulnerabilities.
3) By using this hacker identify as to which attacker is handier to hack the target system.
1 de 9

Recomendados

Module 2   Foot PrintingModule 2   Foot Printing
Module 2 Foot Printingleminhvuong
8.2K vistas38 diapositivas
FootprintingFootprinting
FootprintingDuah John
570 vistas9 diapositivas

Más contenido relacionado

La actualidad más candente

Setting up CSIRTSetting up CSIRT
Setting up CSIRTAPNIC
5.9K vistas79 diapositivas
Cyber securityCyber security
Cyber securityDr. Kishor Nikam
692 vistas30 diapositivas

La actualidad más candente(20)

CSRF BasicsCSRF Basics
CSRF Basics
n|u - The Open Security Community3.9K vistas
Setting up CSIRTSetting up CSIRT
Setting up CSIRT
APNIC5.9K vistas
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
FellowBuddy.com3.2K vistas
Cyber securityCyber security
Cyber security
Dr. Kishor Nikam692 vistas
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
Nitesh Dubey274 vistas
Social engineering attacksSocial engineering attacks
Social engineering attacks
Ramiro Cid5.8K vistas
Computer securityComputer security
Computer security
Shashi Chandra2K vistas
UTM Unified Threat ManagementUTM Unified Threat Management
UTM Unified Threat Management
Lokesh Sharma2.7K vistas
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security
Lokender Yadav2.5K vistas
Owasp top 10Owasp top 10
Owasp top 10
YasserElsnbary427 vistas
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptx
ANIKETKUMARSHARMA3319 vistas
Chapter 3: Information Security FrameworkChapter 3: Information Security Framework
Chapter 3: Information Security Framework
Nada G.Youssef2.5K vistas
Ethical HackingEthical Hacking
Ethical Hacking
BugRaptors1K vistas
Cyber crime & securityCyber crime & security
Cyber crime & security
Ronson Fernandes3.6K vistas

Similar a Ethical hacking - Footprinting.pptx

Footprintig (Haching)Footprintig (Haching)
Footprintig (Haching)Asif Iqbal
482 vistas11 diapositivas
Footprintig(Haching)Footprintig(Haching)
Footprintig(Haching)Asif Iqbal
77 vistas11 diapositivas
Cyber warfare introductionCyber warfare introduction
Cyber warfare introductionjagadeesh katla
657 vistas26 diapositivas

Último(20)

STERILITY TEST.pptxSTERILITY TEST.pptx
STERILITY TEST.pptx
Anupkumar Sharma102 vistas
Gopal Chakraborty Memorial Quiz 2.0 Prelims.pptxGopal Chakraborty Memorial Quiz 2.0 Prelims.pptx
Gopal Chakraborty Memorial Quiz 2.0 Prelims.pptx
Debapriya Chakraborty221 vistas
AI Tools for Business and StartupsAI Tools for Business and Startups
AI Tools for Business and Startups
Svetlin Nakov57 vistas
2022 CAPE Merit List 2023 2022 CAPE Merit List 2023
2022 CAPE Merit List 2023
Caribbean Examinations Council3K vistas
Scope of Biochemistry.pptxScope of Biochemistry.pptx
Scope of Biochemistry.pptx
shoba shoba110 vistas
Psychology KS4Psychology KS4
Psychology KS4
WestHatch52 vistas
Dance KS5 BreakdownDance KS5 Breakdown
Dance KS5 Breakdown
WestHatch52 vistas
Classification of crude drugs.pptxClassification of crude drugs.pptx
Classification of crude drugs.pptx
GayatriPatra1449 vistas
Women from Hackney’s History: Stoke Newington by Sue DoeWomen from Hackney’s History: Stoke Newington by Sue Doe
Women from Hackney’s History: Stoke Newington by Sue Doe
History of Stoke Newington103 vistas
ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1}ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1}
ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1}
DR .PALLAVI PATHANIA156 vistas
BYSC infopack.pdfBYSC infopack.pdf
BYSC infopack.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego144 vistas
NS3 Unit 2 Life processes of animals.pptxNS3 Unit 2 Life processes of animals.pptx
NS3 Unit 2 Life processes of animals.pptx
manuelaromero201389 vistas
Structure and Functions of Cell.pdfStructure and Functions of Cell.pdf
Structure and Functions of Cell.pdf
Nithya Murugan142 vistas
Class 10 English  lesson plansClass 10 English  lesson plans
Class 10 English lesson plans
Tariq KHAN172 vistas
Narration  ppt.pptxNarration  ppt.pptx
Narration ppt.pptx
Tariq KHAN62 vistas
Universe revised.pdfUniverse revised.pdf
Universe revised.pdf
DrHafizKosar84 vistas

Ethical hacking - Footprinting.pptx

  • 1. FOOT PRINTING AND RECONNAISSANCE
  • 2. INTRODUCTION OF FOOTPRINTING Footprinting is an ethical hacking technique used to gather as much data as possible about a specific targeted computer system, an infrastructure and networks to identify opportunities to penetrate them. It is one of the best methods of finding vulnerabilities. The process of cybersecurity footprinting involves profiling organizations and collecting data about the network, host, employees and third-party partners. This information includes the OS used by the organization, firewalls, network maps, IP addresses, domain name system information, security configurations of the target machine, URLs, virtual private networks, staff IDs, email addresses and phone numbers.
  • 3. Types of Footprints a) Active Footprinting: It means performing footprinting by getting indirect touch with target machine. b) Passive Footprinting: It means collecting information about a system located at remote distance from the attacker
  • 4. What is active & passive footprinting? Active footprinting describes the process of using tools and techniques, like using the traceroute commands or a ping sweep -- Internet Control Message Protocol sweep -- to collect data about a specific target. This often triggers the target's intrusion detection system (IDS). It takes a certain level of stealth and creativity to evade detection successfully.  Passive footprinting involves collecting data about a specific target using innocuous methods, like performing a Google search, looking through Archive.org, using NeoTrace, browsing through employees' social media profiles, looking at job sites and using Whois, a website.
  • 6. What Information Is Collected in Footprinting? The goal of footprinting is to gather as much information about the target as possible in order to increase the likelihood of success when actually planning and executing an attack. This includes identifying any security weaknesses and gathering contact information for system administrators and other users who may access sensitive data. During footprinting, various types of information may be collected  OS used by the organization,  firewalls, network maps,  IP addresses,  domain name system information,  security configurations of the target machine,  URLs, virtual private networks, staff IDs,  email addresses and phone numbers.
  • 7. Digital footprint examples Social media sites • Social media credentials connecting other websites • Posting pictures and sharing data on social accounts • Communicating with friends and other contacts Online Banking • Use of a mobile application for online banking • Getting subscriptions to blogs and financial publications • Requesting a credit card account Health • Use of fitness trackers and wearable tech • Using an email address for a gym registration • Getting a subscription to health and fitness blogs
  • 8. What are the steps of footprinting? Information gathering. Determining the range of the network. Identifying active machines. Identifying open ports and access points. OS fingerprinting. Fingerprinting services. Mapping the network.
  • 9. Advantages of Footprinting 1) It allows hackers to gather the basic security configurations of target machine. 2) It is best method of vulnerabilities. 3) By using this hacker identify as to which attacker is handier to hack the target system.