Jump to content
 







Main menu
   


Navigation  



Main page
Contents
Current events
Random article
About Wikipedia
Contact us
Donate
 




Contribute  



Help
Learn to edit
Community portal
Recent changes
Upload file
 








Search  

































Create account

Log in
 









Create account
 Log in
 




Pages for logged out editors learn more  



Contributions
Talk
 



















Contents

   



(Top)
 


1 Techniques used  





2 Software used  





3 Uses  





4 Types  





5 Crawling  





6 WHOIS  





7 Search engines  





8 Traceroute  





9 Negative web search  





10 Information gathered  





11 See also  





12 References  














Footprinting






العربية
Deutsch
فارسی
Français

Português

 

Edit links
 









Article
Talk
 

















Read
Edit
View history
 








Tools
   


Actions  



Read
Edit
View history
 




General  



What links here
Related changes
Upload file
Special pages
Permanent link
Page information
Cite this page
Get shortened URL
Download QR code
Wikidata item
 




Print/export  



Download as PDF
Printable version
 
















Appearance
   

 






From Wikipedia, the free encyclopedia
 


Footprinting (also known as reconnaissance) is the technique used for gathering information about computer systems and the entities they belong to. To get this information, a hacker might use various tools and technologies. This information is very useful to a hacker who is trying to crack a whole system.[1]

When used in the computer security lexicon, "Footprinting" generally refers to one of the pre-attack phases; tasks performed before doing the actual attack. Some of the tools used for Footprinting are Sam Spade, nslookup, traceroute, Nmap and neotrace.[2]

Techniques used[edit]

Software used[edit]

Wireshark

Uses[edit]

It allows a hacker to gain information about the target system or network. This information can be used to carry out attacks on the system. That is the reason by which it may be named a Pre-Attack, since all the information is reviewed in order to get a complete and successful resolution of the attack. Footprinting is also used by ethical hackers and penetration testers to find security flaws and vulnerabilities within their own company's network before a malicious hacker does.[3]

Types[edit]

There are two types of Footprinting that can be used: active Footprinting and passive Footprinting. Active Footprinting is the process of using tools and techniques, such as performing a ping sweep or using the traceroute command, to gather information on a target. Active Footprinting can trigger a target's Intrusion Detection System (IDS) and may be logged, and thus requires a level of stealth to successfully do.[4] Passive Footprinting is the process of gathering information on a target by innocuous, or, passive, means. Browsing the target's website, visiting social media profiles of employees, searching for the website on WHOIS, and performing a Google search of the target are all ways of passive Footprinting. Passive Footprinting is the stealthier method since it will not trigger a target's IDS or otherwise alert the target of information being gathered.[5]

Crawling[edit]

Crawling is the process of surfing the internet to get the required information about the target. The sites surfed can include the target's website, blogs and social networks. The information obtained by this method will be helpful in other methods.

WHOIS[edit]

WHOIS[6] is a web application used to get information about the target website, such as the administrator's e-mail address and details about the registration. WHOIS is a very large database and contains information of approximately all clearnet websites. It can be searched by domain name. [7][8]

Search engines[edit]

Search engines such as Google can also be used to gather information about the target system. It depends on how well one knows how to use search engines to collect information. If used properly, the attacker can gather much information about a company, its career, its policies, etc.

Traceroute[edit]

Information can also be gathered using the command Tracert ("traceroute"), which is used to trace a path between a user and the target system on the networks. That way it becomes clear where a request is being forwarded and through which devices. In Linux systems, the tracepath and traceroute commands are also available for doing traceroute operations.[9]

Negative web search[edit]

Negative web search will reveal some other websites when performed on the target website. Negative websites can act as resources for insight about the flaws of the target website.[10]

Information gathered[edit]

If the attack is to be performed on a company, then the following information will be gathered.

See also[edit]

References[edit]

  1. ^ "What is footprinting? - Definition from WhatIs.com". SearchSecurity. Retrieved 2016-06-09.
  • ^ "FootPrinting-First Step Of Ethical Hacking". Ehacking.net. 21 February 2011.
  • ^ Hendricks, Beth. "What is Footprinting? - Definition, Uses & Process". Study.com. Retrieved 23 January 2020.
  • ^ Lazari, Chris (15 December 2017). "Ethical Hacking Reconnaissance Plan: Active Footprinting". chrislazari.com. Retrieved 23 January 2020.
  • ^ Lazari, Chris (12 July 2017). "Ethical Hacking Reconnaissance Plan: Passive Footprinting". chrislazari.com. Retrieved 23 January 2020.
  • ^ "Whois Lookup, Domain Availability & IP Search - DomainTools".
  • ^ "What is Whois? - Definition from Techopedia". Techopedia.com. Retrieved 2016-06-09.
  • ^ "Whois Definition from PC Magazine Encyclopedia". www.pcmag.com. Retrieved 2016-06-09.
  • ^ "Footprinting and scanning tools". home.ubalt.edu. Retrieved 2016-06-09.
  • ^ "Negative web search". teachmehacking. Retrieved 1 September 2017.
  • ^ "Information to be gathered". dummies. Retrieved 25 August 2017.

  • Retrieved from "https://en.wikipedia.org/w/index.php?title=Footprinting&oldid=1185038510"

    Categories: 
    Computer security
    Computing terminology
    Hidden categories: 
    Articles needing additional references from December 2009
    All articles needing additional references
     



    This page was last edited on 14 November 2023, at 04:37 (UTC).

    Text is available under the Creative Commons Attribution-ShareAlike License 4.0; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non-profit organization.



    Privacy policy

    About Wikipedia

    Disclaimers

    Contact Wikipedia

    Code of Conduct

    Developers

    Statistics

    Cookie statement

    Mobile view



    Wikimedia Foundation
    Powered by MediaWiki