Skip to main content

Footprinting In Hacking

Footprinting in hacking is the process of studying an organization or system, with the aim of collecting valid or genuine information, which gives the attacker a clue and can help him find the vulnerability in the system.

This is the first step in any systematic hacking approach. Attacker or ethical hacker will spent time in this stage carefully, because slit mistake in footprinting might leads to wastage of time, which can lead to the failure of the attack.

After collecting data, hacker needs to spend time verifying and updating the extracted data. Attacker that doesn't update the data collected, might end-up doing nothing. How? Because the organization or individual can migrate from the known system. Thus leaving him with useless information.

Steps to ensure Proper Information retrieval

Since this stage is all about passive information gathering, below are the best practice that will leads to extracting the most genuine information.

Carefully collect public available information regarding the target system or organization. Information like host, network information, location of devices, physical security etc.
Attacker must find out the OS (operating system) used on the host devices and the server respectively. Applications installed on the server are also not left out. Remember servers are as important as the application software installed.
Attacker have to get an insight regarding the network. Knowing whether the organization permits remote network access, uses WIFI, knows the network topologies in use etc.
Extracting the IP address and other network information. Networking tools like Traceroute (tracert in windows), Ping, tenet etc. will really give a helping hand here.
Study the organization set-up. Sometimes the simplest way to hack into any system is to meet non technical staff of an organization.
In the case of web hacking, online tool like builtwith can surely help in information gathering.
Issue queries like Whois, DNS, network and organizational queries, will definitely help. especially regarding knowing the networking strength and how to overcome it.
Certain sites helps in getting information on the target. Site like zabasearch.com (this contains names, addresses, phone numbers, date of birth and other individuals information), anywho.com (this offer phone book forwards and lookup) will really help in getting information on the employees.
Attacker should locate vulnerability on the existing system which can help in success of the attack.

References: Sybex CEH, Ehacking
Tobe continued
Join Us on Facebook: ICTmagazine BBM Chanel: ICTmagazine

Comments

Popular posts from this blog

Microsoft Office for Tablet now on Google Play store

Back in November, Microsoft opened up early previews builds for its new mobile Office applications for Android tablets to those willing to sign up and wait for an invitation. After taking on feedback over the past couple of months, Microsoft has announced that it is expanding its preview scheme by releasing its Office applications to everyone directly through the Google Play Store. The new Office software for mobile unifies Android, IOS, and Windows platforms. Previously each platform had to make do with its own apps, meaning that feature sets differed depending on your operating system and updates were often slow and intermittent. By unifying the Office platform, Microsoft hopes to bring updates and new features to users in a timelier manner. There are still a couple of conditions attached to the preview builds though. Firstly, Office is still limited to ARM-based Android tablets with a screen size between 7 and 10.1 inches. Your tablet will also need to be running Ki...

iTunes Connect is down!

Something is wrong in Cupertino. A number of developers today turned to Twitter to complain that iTunes Connect, a hub for iOS and Mac software makers, was logging them into the wrong accounts.  The service appears to be matching log-ins with the wrong accounts, showing apps and usernames from completely different people. When developers try to access one of the apps, they receive an error message leading them back to their own account. iTunes Connect has since been taken offline as Apple’s engineers presumably set off to fix the problem. We’ve contacted Apple and will update if we hear back. Culled from:  The Next Web

Turn your Word doc into a PDF with a live table of contents

A long report needs to be broken up into sections. Readers will want shortcuts to the chapters that most interest them. So, if you’re distributing your reports as PDFs, you’ll want live tables of contents in which readers can easily go to the chapters they want to read. Fortunately, this is easy to do in Word 2010 or 2013 (I haven’t tested this in earlier versions). First of all, you need to set up your document properly. Use Word’s outline styles— Heading 1, Heading 2 , and so on—to organize your report. For instance, you might want to assign large section titles as Heading 1, chapter titles as Heading 2, sub-chapters as Heading 3, and so on. By the way, using these headings has other advantages. You can select View>Outline and work on your document as a collapsible outline. Also, the left tab of the Navigation pane uses these styles. But back to the table of contents. When you’re ready to distribute your document, select the References tab and click...