Ticker

"WEBSITE UNDER MAINTENANCE"

FOOTPRINTING AND HOW TO THE FOOTPRINTING LIKE PROFESSIONAL:-

 FOOTPRINTING

WHAT IS FOOTPRINTING?

Are you an avid user of social media? Do you have a following of hundreds on insta or do you own your own page on facebook? Or are you just a humble meme lover?

If you fall under any of these categories then the following videos are for you.

WHY SOCIAL IS THE NEW VIRAL

Footprinting is the first step of hacking. It refers to extracting information about the target. It’s reconnaissance that the hacker performs to gather as much information from the computer he plans on hacking into. It contains information such as email id, passwords, type of operating system etc.

We share everything on social media and we mean everything! This provides easy information to hacker!!

While this may seem like a cute way to preserve all your memories, hackers can use this information to easily know your laptop’s credentials. Now…. You wouldn’t want a hacker to have access to your computer, would you?

So, watch this video and know all about the information we put out on social media and how to stay safe while having fun.

TYPES OF FOOTPRINTING

In the world of Cyber Security, Footprinting is the first step which lets penetration testers gather information about hardware or network.

Footprinting can be done either actively or passively. Assessing a company’s website with their permission is an illustration of passive footprinting and trying to access sensitive information through social engineering is an illustration of active information gathering.

1.      Footprinting through Search Engine

2.      Footprinting through Social Networking sites

3.      Footprinting through social engineering

4.      Footprinting using advanced Google hacking techniques

As we progress in the journey, we will learn more about these techniques.

FOOTPRINTING THROUGH SOCIAL ENGINEERING

Social engineering is an art of manipulating human behavior to our own advantage. This proves most helpful when the need for extraction of confidential information.

The most common example for this is when people call as fake credit/ debit card companies and try to extract information.

Techniques used for social engineering are:

1.      Eavesdropping

2.      Shoulder surfing

3.      Dumpster driving

This is how footprinting is done through searching engines, social networking sites and social engineering. As white hat hackers, we should know about it but we should also be aware try to protect ourselves from black hat hackers against footprinting.

WHAT IS “DNS” FOOTPRINTING?

DNS is a naming system for computers that converts human-readable domain names into computer readable IP-addresses and vice versa.

Resource records responded by the name servers should have the following fields:

1.      Domain Name- Identifying the domain name or owner of the records

2.      Record Types- Specifying the type of data in the resource record

3.      Record Class – Identifying a class of network or protocol family in use

4.      Time to Live (TTL) – Specifying the amount of time a record can be stored in cache before discarded.

5.      Record Data- Providing the type and class dependent data to describe the resources.

DNS servers perform zone servers perform zone transfers to keep themselves up to date with the latest information. A zone transfer of a target domain gives a list of all public hosts, their respective IP addresses, and the record type.

1.      Which one of the following is an illustration of active information gathering?

a.      Shoulder surfing

b.      Rootkits

c.      Permitted access to a website

d.      Search engines

Ans- Shoulder surfing

KEY TAKEAWAYS!

Let us go through the key point once again.

·        Footprinting means gathering information about a target system which can be used to execute a successful cyber-attack.

·        There are 2 types of footprinting. Active Footprinting and Passive Footprinting.

·        Proper footprinting is equal to half the hack successfully performed.

Post a Comment

0 Comments

Subscribe

We'll send you AWESOME content!