Ethical Overflow - A new focus on Cyber Security

Ethical Hacking - Overview

Ethical Hacking-Footprinting

 The technique used for gathering information about computer systems and the entities they belong to. To get this information, a hacker might use various tools and technologies. This information is very useful to a hacker who is trying to crack a whole system.

Footprinting is a first and the important step because after this a penetration tester know how the hacker sees this network.

To measure the security of a computer system, it is good to know more and more as you can because after this you will able to determine the path that a hacker will use to exploit this network.

Footprinting Helps A Hacker To Collect the following information −

  • IP Addresses

  • Employee information

  • E-mails

  • Domain name

  • Employee information

  • Phone number

  • Discover open ports

  • Locate the network range

  • Map the network

 Footprinting Is Divided In To Two Phase Passive and Active.

 Active:-

Mirroring Websites-

Downloads all availabe contents for offline anlysis:-

-Telepart pro

-Imiser

-HTTtrack website copier

Email Tracing:-

Examine E-mail processing path.

-Email Tracker Pro

-MSGTAG

-Polite Mail

-Zendio

Server Verification:-

Determine server are reachable

Enumrate network path from attacker to target

Identifies connectivity with target

-Ping

-Tracert

Visual Traceroute

-Sam spade

-TCR trade route

Tools are going to use:-

-Google searching

-www.hackerforcharity.com

-www.websiteinformer.com

-HTTrack website copier

-Email tracer pro

-Ping

-Tracert

-Sam spade

-www.archive.org

 

Passive-

Passive footprinting is a method in which the attacker never makes any contact with the target system.

-Google search-inurl: site .filetype

-whois queries

-DNS lookup:

-Social networking site