Ethical hacking - Footprinting.pptx

N
Nargis ParveenAsst. professor
FOOT PRINTING AND RECONNAISSANCE
INTRODUCTION OF FOOTPRINTING
Footprinting is an ethical hacking technique used to gather as much data as possible about a specific
targeted computer system, an infrastructure and networks to identify opportunities to penetrate
them. It is one of the best methods of finding vulnerabilities.
The process of cybersecurity footprinting involves profiling organizations and collecting data about
the network, host, employees and third-party partners. This information includes the OS used by the
organization, firewalls, network maps, IP addresses, domain name system information, security
configurations of the target machine, URLs, virtual private networks, staff IDs, email addresses and
phone numbers.
Types of Footprints
a) Active Footprinting: It means performing footprinting by getting
indirect touch with target machine.
b) Passive Footprinting: It means collecting information about a system
located at remote distance from the attacker
What is active & passive footprinting?
Active footprinting describes the process of using tools and techniques, like using
the traceroute commands or a ping sweep -- Internet Control Message Protocol sweep -- to
collect data about a specific target. This often triggers the target's intrusion detection system
(IDS). It takes a certain level of stealth and creativity to evade detection successfully.
 Passive footprinting involves collecting data about a specific target using innocuous methods,
like performing a Google search, looking through Archive.org, using NeoTrace, browsing through
employees' social media profiles, looking at job sites and using Whois, a website.
Ethical hacking - Footprinting.pptx
What Information Is Collected in Footprinting?
The goal of footprinting is to gather as much information about the target as possible in order to
increase the likelihood of success when actually planning and executing an attack. This includes
identifying any security weaknesses and gathering contact information for system administrators
and other users who may access sensitive data. During footprinting, various types of information
may be collected
 OS used by the organization,
 firewalls, network maps,
 IP addresses,
 domain name system information,
 security configurations of the target machine,
 URLs, virtual private networks, staff IDs,
 email addresses and phone numbers.
Digital footprint examples
Social media sites
• Social media credentials connecting other websites
• Posting pictures and sharing data on social accounts
• Communicating with friends and other contacts
Online Banking
• Use of a mobile application for online banking
• Getting subscriptions to blogs and financial publications
• Requesting a credit card account
Health
• Use of fitness trackers and wearable tech
• Using an email address for a gym registration
• Getting a subscription to health and fitness blogs
What are the steps of footprinting?
Information gathering.
Determining the range of the network.
Identifying active machines.
Identifying open ports and access points.
OS fingerprinting.
Fingerprinting services.
Mapping the network.
Advantages of Footprinting
1) It allows hackers to gather the basic security configurations of target machine.
2) It is best method of vulnerabilities.
3) By using this hacker identify as to which attacker is handier to hack the target system.
1 de 9

Recomendados

Ethical hacking Chapter 1 - Overview.pptx por
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxNargis Parveen
3K visualizações17 slides
Cyber kill chain por
Cyber kill chainCyber kill chain
Cyber kill chainAnkita Ganguly
3.8K visualizações6 slides
Module 2 Foot Printing por
Module 2   Foot PrintingModule 2   Foot Printing
Module 2 Foot Printingleminhvuong
8.2K visualizações38 slides
Overview of the Cyber Kill Chain [TM] por
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]David Sweigert
3.5K visualizações16 slides
Threat landscape 4.0 por
Threat landscape 4.0Threat landscape 4.0
Threat landscape 4.0Dr. C.V. Suresh Babu
775 visualizações17 slides
Investigating Using the Dark Web por
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark WebCase IQ
8K visualizações27 slides

Mais conteúdo relacionado

Mais procurados

Digital Threat Landscape por
Digital Threat LandscapeDigital Threat Landscape
Digital Threat LandscapeQuick Heal Technologies Ltd.
1K visualizações9 slides
Understanding Your Attack Surface and Detecting & Mitigating External Threats por
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUnderstanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUlf Mattsson
996 visualizações29 slides
Cyber Table Top Exercise -- Model Roadmap por
Cyber Table Top Exercise -- Model RoadmapCyber Table Top Exercise -- Model Roadmap
Cyber Table Top Exercise -- Model RoadmapDavid Sweigert
3.8K visualizações77 slides
Cyber security and demonstration of security tools por
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security toolsVicky Fernandes
2.6K visualizações46 slides
Cyber security ppt final por
Cyber security ppt finalCyber security ppt final
Cyber security ppt finalSanishShrestha2
288 visualizações27 slides
Penetration testing reporting and methodology por
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodologyRashad Aliyev
5.3K visualizações18 slides

Mais procurados(20)

Understanding Your Attack Surface and Detecting & Mitigating External Threats por Ulf Mattsson
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUnderstanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Ulf Mattsson996 visualizações
Cyber Table Top Exercise -- Model Roadmap por David Sweigert
Cyber Table Top Exercise -- Model RoadmapCyber Table Top Exercise -- Model Roadmap
Cyber Table Top Exercise -- Model Roadmap
David Sweigert3.8K visualizações
Cyber security and demonstration of security tools por Vicky Fernandes
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security tools
Vicky Fernandes2.6K visualizações
Cyber security ppt final por SanishShrestha2
Cyber security ppt finalCyber security ppt final
Cyber security ppt final
SanishShrestha2288 visualizações
Penetration testing reporting and methodology por Rashad Aliyev
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodology
Rashad Aliyev5.3K visualizações
OSINT: Open Source Intelligence gathering por Jeremiah Tillman
OSINT: Open Source Intelligence gatheringOSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gathering
Jeremiah Tillman1.1K visualizações
OSINT with Practical: Real Life Examples por SyedAmoz
OSINT with Practical: Real Life ExamplesOSINT with Practical: Real Life Examples
OSINT with Practical: Real Life Examples
SyedAmoz520 visualizações
Cyber Threat Hunting Workshop por Digit Oktavianto
Cyber Threat Hunting WorkshopCyber Threat Hunting Workshop
Cyber Threat Hunting Workshop
Digit Oktavianto683 visualizações
Introduction to MITRE ATT&CK por Arpan Raval
Introduction to MITRE ATT&CKIntroduction to MITRE ATT&CK
Introduction to MITRE ATT&CK
Arpan Raval986 visualizações
Network security por Madhumithah Ilango
Network security Network security
Network security
Madhumithah Ilango17.9K visualizações
Open Source Intelligence (OSINT) por festival ICT 2016
Open Source Intelligence (OSINT)Open Source Intelligence (OSINT)
Open Source Intelligence (OSINT)
festival ICT 20169.8K visualizações
Social media and Security risks por Parakum Pathirana
Social media and Security risksSocial media and Security risks
Social media and Security risks
Parakum Pathirana3K visualizações
Social Media Forensics por John J. Carney, Esq.
Social Media ForensicsSocial Media Forensics
Social Media Forensics
John J. Carney, Esq.1.4K visualizações
MITRE ATT&CKcon 2018: Building an Atomic Testing Program, Brian Beyer, Red Ca... por MITRE - ATT&CKcon
MITRE ATT&CKcon 2018: Building an Atomic Testing Program, Brian Beyer, Red Ca...MITRE ATT&CKcon 2018: Building an Atomic Testing Program, Brian Beyer, Red Ca...
MITRE ATT&CKcon 2018: Building an Atomic Testing Program, Brian Beyer, Red Ca...
MITRE - ATT&CKcon2K visualizações
Threat Hunting Report por Morane Decriem
Threat Hunting Report Threat Hunting Report
Threat Hunting Report
Morane Decriem1.2K visualizações
The Cyber Attack Lifecycle por Cybereason
The Cyber Attack LifecycleThe Cyber Attack Lifecycle
The Cyber Attack Lifecycle
Cybereason3.9K visualizações
Threat Intelligence por Deepak Kumar (D3)
Threat IntelligenceThreat Intelligence
Threat Intelligence
Deepak Kumar (D3) 3.3K visualizações
Cyber security for an organization por Tejas Wasule
Cyber security for an organizationCyber security for an organization
Cyber security for an organization
Tejas Wasule2.8K visualizações

Similar a Ethical hacking - Footprinting.pptx

Survey on classification techniques for intrusion detection por
Survey on classification techniques for intrusion detectionSurvey on classification techniques for intrusion detection
Survey on classification techniques for intrusion detectioncsandit
534 visualizações9 slides
Footprinting por
FootprintingFootprinting
FootprintingDuah John
576 visualizações9 slides
Footprintig (Haching) por
Footprintig (Haching)Footprintig (Haching)
Footprintig (Haching)Asif Iqbal
483 visualizações11 slides
Footprintig(Haching) por
Footprintig(Haching)Footprintig(Haching)
Footprintig(Haching)Asif Iqbal
77 visualizações11 slides
A Study on Data Mining Based Intrusion Detection System por
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemAM Publications
479 visualizações5 slides
A Study on Data Mining Based Intrusion Detection System por
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemAM Publications
339 visualizações5 slides

Similar a Ethical hacking - Footprinting.pptx(20)

Survey on classification techniques for intrusion detection por csandit
Survey on classification techniques for intrusion detectionSurvey on classification techniques for intrusion detection
Survey on classification techniques for intrusion detection
csandit534 visualizações
Footprinting por Duah John
FootprintingFootprinting
Footprinting
Duah John576 visualizações
Footprintig (Haching) por Asif Iqbal
Footprintig (Haching)Footprintig (Haching)
Footprintig (Haching)
Asif Iqbal483 visualizações
Footprintig(Haching) por Asif Iqbal
Footprintig(Haching)Footprintig(Haching)
Footprintig(Haching)
Asif Iqbal77 visualizações
A Study on Data Mining Based Intrusion Detection System por AM Publications
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection System
AM Publications479 visualizações
A Study on Data Mining Based Intrusion Detection System por AM Publications
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection System
AM Publications339 visualizações
Cyber warfare introduction por jagadeesh katla
Cyber warfare introductionCyber warfare introduction
Cyber warfare introduction
jagadeesh katla657 visualizações
Pattern Analysis and Signature Extraction for Intrusion Attacks on Web Services por IJNSA Journal
Pattern Analysis and Signature Extraction for Intrusion Attacks on Web ServicesPattern Analysis and Signature Extraction for Intrusion Attacks on Web Services
Pattern Analysis and Signature Extraction for Intrusion Attacks on Web Services
IJNSA Journal16 visualizações
Internship ankita jain por Ankita Jain
Internship ankita jainInternship ankita jain
Internship ankita jain
Ankita Jain50 visualizações
Information Technology Security Is Vital For The Success... por Brianna Johnson
Information Technology Security Is Vital For The Success...Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...
Brianna Johnson8 visualizações
Knowledge base compound approach against phishing attacks using some parsing ... por csandit
Knowledge base compound approach against phishing attacks using some parsing ...Knowledge base compound approach against phishing attacks using some parsing ...
Knowledge base compound approach against phishing attacks using some parsing ...
csandit4.1K visualizações
KNOWLEDGE BASE COMPOUND APPROACH AGAINST PHISHING ATTACKS USING SOME PARSING ... por cscpconf
KNOWLEDGE BASE COMPOUND APPROACH AGAINST PHISHING ATTACKS USING SOME PARSING ...KNOWLEDGE BASE COMPOUND APPROACH AGAINST PHISHING ATTACKS USING SOME PARSING ...
KNOWLEDGE BASE COMPOUND APPROACH AGAINST PHISHING ATTACKS USING SOME PARSING ...
cscpconf30 visualizações
Whitepaper: Network Penetration Testing - Happiest Minds por Happiest Minds Technologies
Whitepaper: Network Penetration Testing - Happiest MindsWhitepaper: Network Penetration Testing - Happiest Minds
Whitepaper: Network Penetration Testing - Happiest Minds
Happiest Minds Technologies635 visualizações
Penetration testing por PTC
Penetration testing Penetration testing
Penetration testing
PTC691 visualizações
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx por SuhailShaik16
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptxINTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
SuhailShaik169 visualizações
Web hacking 1.0 por Q Fadlan
Web hacking 1.0Web hacking 1.0
Web hacking 1.0
Q Fadlan722 visualizações
Unit v por bharatnaruka90
Unit vUnit v
Unit v
bharatnaruka90243 visualizações
Ethical hacking at warp speed por Sreejith.D. Menon
Ethical hacking at warp speedEthical hacking at warp speed
Ethical hacking at warp speed
Sreejith.D. Menon181 visualizações
Domain 2 of CEH v11 Reconnaissance Techniques (21%).pptx por Infosectrain3
Domain 2 of CEH v11 Reconnaissance Techniques (21%).pptxDomain 2 of CEH v11 Reconnaissance Techniques (21%).pptx
Domain 2 of CEH v11 Reconnaissance Techniques (21%).pptx
Infosectrain346 visualizações
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES por AM Publications,India
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICESHOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
AM Publications,India82 visualizações

Último

11.28.23 Social Capital and Social Exclusion.pptx por
11.28.23 Social Capital and Social Exclusion.pptx11.28.23 Social Capital and Social Exclusion.pptx
11.28.23 Social Capital and Social Exclusion.pptxmary850239
383 visualizações25 slides
CONTENTS.pptx por
CONTENTS.pptxCONTENTS.pptx
CONTENTS.pptxiguerendiain
65 visualizações17 slides
Create a Structure in VBNet.pptx por
Create a Structure in VBNet.pptxCreate a Structure in VBNet.pptx
Create a Structure in VBNet.pptxBreach_P
80 visualizações8 slides
A-Level Art por
A-Level ArtA-Level Art
A-Level ArtWestHatch
48 visualizações82 slides
ICS3211_lecture 09_2023.pdf por
ICS3211_lecture 09_2023.pdfICS3211_lecture 09_2023.pdf
ICS3211_lecture 09_2023.pdfVanessa Camilleri
126 visualizações10 slides
Thanksgiving!.pdf por
Thanksgiving!.pdfThanksgiving!.pdf
Thanksgiving!.pdfEnglishCEIPdeSigeiro
401 visualizações17 slides

Último(20)

11.28.23 Social Capital and Social Exclusion.pptx por mary850239
11.28.23 Social Capital and Social Exclusion.pptx11.28.23 Social Capital and Social Exclusion.pptx
11.28.23 Social Capital and Social Exclusion.pptx
mary850239383 visualizações
CONTENTS.pptx por iguerendiain
CONTENTS.pptxCONTENTS.pptx
CONTENTS.pptx
iguerendiain65 visualizações
Create a Structure in VBNet.pptx por Breach_P
Create a Structure in VBNet.pptxCreate a Structure in VBNet.pptx
Create a Structure in VBNet.pptx
Breach_P80 visualizações
A-Level Art por WestHatch
A-Level ArtA-Level Art
A-Level Art
WestHatch48 visualizações
ICS3211_lecture 09_2023.pdf por Vanessa Camilleri
ICS3211_lecture 09_2023.pdfICS3211_lecture 09_2023.pdf
ICS3211_lecture 09_2023.pdf
Vanessa Camilleri126 visualizações
UNIDAD 3 6º C.MEDIO.pptx por MarcosRodriguezUcedo
UNIDAD 3 6º C.MEDIO.pptxUNIDAD 3 6º C.MEDIO.pptx
UNIDAD 3 6º C.MEDIO.pptx
MarcosRodriguezUcedo139 visualizações
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx por ISSIP
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptxEIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx
ISSIP407 visualizações
Narration lesson plan por TARIQ KHAN
Narration lesson planNarration lesson plan
Narration lesson plan
TARIQ KHAN64 visualizações
GCSE Geography por WestHatch
GCSE GeographyGCSE Geography
GCSE Geography
WestHatch47 visualizações
Volf work.pdf por MariaKenney3
Volf work.pdfVolf work.pdf
Volf work.pdf
MariaKenney366 visualizações
Relationship of psychology with other subjects. por palswagata2003
Relationship of psychology with other subjects.Relationship of psychology with other subjects.
Relationship of psychology with other subjects.
palswagata200377 visualizações
The basics - information, data, technology and systems.pdf por JonathanCovena1
The basics - information, data, technology and systems.pdfThe basics - information, data, technology and systems.pdf
The basics - information, data, technology and systems.pdf
JonathanCovena1156 visualizações
JQUERY.pdf por ArthyR3
JQUERY.pdfJQUERY.pdf
JQUERY.pdf
ArthyR396 visualizações
Class 9 lesson plans por TARIQ KHAN
Class 9 lesson plansClass 9 lesson plans
Class 9 lesson plans
TARIQ KHAN53 visualizações
GCSE Media por WestHatch
GCSE MediaGCSE Media
GCSE Media
WestHatch48 visualizações
Meet the Bible por Steve Thomason
Meet the BibleMeet the Bible
Meet the Bible
Steve Thomason69 visualizações
Recap of our Class por Corinne Weisgerber
Recap of our ClassRecap of our Class
Recap of our Class
Corinne Weisgerber100 visualizações

Ethical hacking - Footprinting.pptx

  • 1. FOOT PRINTING AND RECONNAISSANCE
  • 2. INTRODUCTION OF FOOTPRINTING Footprinting is an ethical hacking technique used to gather as much data as possible about a specific targeted computer system, an infrastructure and networks to identify opportunities to penetrate them. It is one of the best methods of finding vulnerabilities. The process of cybersecurity footprinting involves profiling organizations and collecting data about the network, host, employees and third-party partners. This information includes the OS used by the organization, firewalls, network maps, IP addresses, domain name system information, security configurations of the target machine, URLs, virtual private networks, staff IDs, email addresses and phone numbers.
  • 3. Types of Footprints a) Active Footprinting: It means performing footprinting by getting indirect touch with target machine. b) Passive Footprinting: It means collecting information about a system located at remote distance from the attacker
  • 4. What is active & passive footprinting? Active footprinting describes the process of using tools and techniques, like using the traceroute commands or a ping sweep -- Internet Control Message Protocol sweep -- to collect data about a specific target. This often triggers the target's intrusion detection system (IDS). It takes a certain level of stealth and creativity to evade detection successfully.  Passive footprinting involves collecting data about a specific target using innocuous methods, like performing a Google search, looking through Archive.org, using NeoTrace, browsing through employees' social media profiles, looking at job sites and using Whois, a website.
  • 6. What Information Is Collected in Footprinting? The goal of footprinting is to gather as much information about the target as possible in order to increase the likelihood of success when actually planning and executing an attack. This includes identifying any security weaknesses and gathering contact information for system administrators and other users who may access sensitive data. During footprinting, various types of information may be collected  OS used by the organization,  firewalls, network maps,  IP addresses,  domain name system information,  security configurations of the target machine,  URLs, virtual private networks, staff IDs,  email addresses and phone numbers.
  • 7. Digital footprint examples Social media sites • Social media credentials connecting other websites • Posting pictures and sharing data on social accounts • Communicating with friends and other contacts Online Banking • Use of a mobile application for online banking • Getting subscriptions to blogs and financial publications • Requesting a credit card account Health • Use of fitness trackers and wearable tech • Using an email address for a gym registration • Getting a subscription to health and fitness blogs
  • 8. What are the steps of footprinting? Information gathering. Determining the range of the network. Identifying active machines. Identifying open ports and access points. OS fingerprinting. Fingerprinting services. Mapping the network.
  • 9. Advantages of Footprinting 1) It allows hackers to gather the basic security configurations of target machine. 2) It is best method of vulnerabilities. 3) By using this hacker identify as to which attacker is handier to hack the target system.