In this article i ll tell you about thefootprinting technique used for hacking and ethical hacking purposes.
Legal Disclaimer :- The information provided in this WebSite (HackerFind.com) is to be used for educational purposes only. The author
holds no responsibility for any misuse of the information provided.
holds no responsibility for any misuse of the information provided.
Footprinting is the technique of gathering information about computer systems and theentities they belong to. This is done by employing various computer security techniques, as:
_
_
DNS queries
Network enumeration
Network queries
Operating system identification
Organizational queries
Ping sweeps
Point of contact queries
Port Scanning
Registrar queries (WHOIS queries)
SNMP queries
World Wide Web spidering
Footprinting Methodology :-
Collect Network Information :-
Domain Name -; Networking Protocol
Internal Domain Name -; VPN Points
Network Blocks -; ACLs
IP Address of the reachable system -; IDSes Running
Rogue Website/Private Website -; Analog/Digital Tel. Numbers
TCP and UDP Services Running -; Authentication mechanisms
Collect System Information :-
Users and Groups names -; System architecture
System Banners -; Remote System Type
Routing Banners -; System Names
SNMP Information -; Passwords
Collect Organization’s Information :-
Employee Details – Addresses and Phone ,Numbers ,
Organization’s Website –;Background on the organization
Company Directory –;News articles/Press releases
Would love to here from you...