Ethical Hacking modules 1 first step footprinting

in #education7 years ago

Footprinting is a first step that a penetration tester used to evaluate the security of any IT infrastructure, footprinting means to gather the maximum information about the computer system or a network and about the devices that are attached to this network.

Footprinting is a first and the important step because after this a penetration tester know how the hacker sees this network.
To measure the security of a computer system, it is good to know more and more as you can because after this you will able to determine the path that a hacker will use to exploit this

This is the basic block diagram which shows the steps that are include in the penetration testing methodology, in this article we will discuss the first one that is footprinting. The EC-Council divides footprinting and scanning into seven basic steps. These include

  1. Information gathering
  2. Determining the network range
  3. Identifying active machines
  4. Finding open ports and access points
  5. OS fingerprinting
  6. Fingerprinting services
  7. Mapping the network

Information of a organisation means to finding these:
Internet: Domain name, network blocks, IP addresses open to Net, TCP and UDP services running, ACLs, IDSes
Intranet: Protocols (IP,NETBIOS), internal domain names, etc
Remote Access: Phone numbers, remote control, telnet, authentication
Extranet: Connection origination, destination, type, access control
Website on an organisation is a first place from where penetration testing start, you can get the sensitive information about the network by using websites, you can get Phone Numbers, Contact Names, E-mail Addresses, and Personal Details. Beside the official website of the company an attacker might be use some social networking website like facebook to gather the appropriate information. Some other resources and a website that an attacker may use to get the maximum information about the organisation and it employees are:

zabasearch.com—Contains names, addresses, phone numbers, date of birth, and other information about individuals.
anywho.com—Phone book offering forward and reverse lookups.
maps.yahoo.com—Yahoo! map site.
You can use the facility of a search engine to perform footprinting,search engine like google, yahoo or altavista provide the plate form to gather the information. Advance google dorks may be use to get the information like:
Filetype: This operator directs Google to search only within the test of a particular type of file.
Example: filetype:xls

Inurl: This operator directs Google to search only within the specified URL of a document.
Example: inurl:search-text

Link: The link operator directs Google to search within hyperlinks for a specific term.
Example link:www.domain.com

Intitle: The intitle operator directs Google to search for a term within the title of a document.
Example intitle: “Index of...etc”

Sort:  

I'm a total nube, and I find this super interesting.... What better way to understand my own cyber security than by deconstructing it?

Ethical hacking cyber security is best

So much to learn about.

Nice post. Followed you. Please follow me.

Coin Marketplace

STEEM 0.27
TRX 0.20
JST 0.039
BTC 97468.81
ETH 3593.60
USDT 1.00
SBD 3.89