FootPrinting

 (also known as reconnaissance) is the technique used for gathering information about computer systems and the entities they belong to. To get this information, a hacker might use various tools and technologies. This information is very useful to a hacker who is trying to crack a whole system.

Footprinting Technology

DNA Foot Printing

 DNA footprinting is a method of investigating the sequence specificity of DNA-binding  proteins in vitro. This technique can be used to study protein-DNA  interactions both outside and within cells.

Reconnaissance Foot Printing

 Footprinting (also known as reconnaissance) is the technique used for gathering  information about computer systems and the entities they belong to. To  get this information, a hacker might use various tools and technologies.

Ethical Hacking Foot Printing

 Footprinting is a part of reconnaissance process which is used for gathering  possible information about a target computer system or network. Footprinting could be both passive and active. Reviewing a company's website is an example of passive footprinting, whereas attempting to gain access to ...

More Foot Printing Info

 A method for detecting sites of interaction between regulatory or promoter proteins and DNA (DNA footprinting) or DNA and RNA (RNA footprinting) footprinting a technique used to identify the region of a DNA molecule to which a specific PROTEIN binds.

How to erase Foot Prints

 Footprinting is the first and most convenient way that hackers use to gather  information about computer systems and the companies they belong to. The  purpose of footprinting is to learn as much as you can about a  system, its remote access capabilities, its ports and services, and the  aspects of its security.

FAQs

Footprinting comes in different types but what it all comes down to is mapping your personal DNA and your presents in the digital world.

foot printing

Additional Information

   Footprinting (also known as reconnaissance) is the technique used for gathering information about computer systems and the entities they belong to. To get this information, a hacker might use various tools and technologies. This information is very useful to a hacker who is trying to crack a whole system.[1]

When used in the computer security lexicon, "Footprinting" generally refers to one of the pre-attack phases; tasks performed before doing the actual attack. Some of the tools used for Footprinting are Sam Spade, nslookup, traceroute, Nmap and neotrace.[2]

Contents

Techniques used for Footprinting[edit]

Uses of Footprinting[edit]

It allows a hacker to gain information about the target system. This information can be used to carry out further attacks on the system. That is the reason by which it may be named a Pre-Attack, since all the information is reviewed in order to get a complete and successful resolution of the attack.

Crawling[edit]

Crawling is the process of surfing the internet to get the required information about the target. The sites surfed can include the target’s website, blogs and social networks. The information obtained by this method will be helpful in other methods.CRAWLING

Whois[edit]

WHOIS[3] is a web application used to get information about the target website, such as the administrator's e-mail address and details about the registration. WHOIS is a very large database and contains information of approximately all the websites. It can be searched by domain name. [4][5]

Search engines[edit]

Search engines such as Google can also be used to gather information about the target system. It depends on how well one knows how to use search engines to collect information. If used properly, the attacker can gather lots of information about a company, its career and its policies etc.

Traceroute[edit]

Information can also be gathered using the command Tracert ("traceroute"), which is used to trace a path between a user and the target system on the networks. That way it becomes clear where a request is being forwarded and through which devices. In Linux systems, the tracepath and traceroute commands are also available for doing traceroute operations.[6]

Negative web search[edit]

Negative web search will reveal some other websites when performed on the target website. Negative websites can act as resources for insight about the flaws of the target website.[7]

Information to be Gathered[edit]

If the attack is to be performed on a company, then the following information will be gathered.

  • Company details, employee details and their email addresses.
  • Relation with other companies.
  • Project details involving other companies.
  • Legal documents of the company.
  • News relating company website.
  • Patents and Trademarks regarding that particular company.
  • Important dates regarding new projects.[8]

See also[edit]

Basics of Footprinting

References[edit]

  1. ^ "What is footprinting? - Definition from WhatIs.com". SearchSecurity. Retrieved 2016-06-09.
  2. ^ "FootPrinting-First Step Of Ethical Hacking". Ehacking.net.
  3. ^ http://www.whois.sc/
  4. ^ "What is Whois? - Definition from Techopedia". Techopedia.com. Retrieved 2016-06-09.
  5. ^ "Whois Definition from PC Magazine Encyclopedia". www.pcmag.com. Retrieved 2016-06-09.
  6. ^ "Footprinting and scanning tools". home.ubalt.edu. Retrieved 2016-06-09.
  7. ^ "Negative web search". teachmehacking. Retrieved 1 September 2017.
  8. ^ "Information to be gathered". dummies. Retrieved 25 August 2017.

image59

Footprinting Links to

Link Electronics

image60

 

Link Advanced Tech

image61

 

Link Biology

image62

 

Link Frequencies

image63

 

Link Mind

image64

 

Link Hacking

image65

 

Games

image66

 

Movies

image67

 

Programming

image68