Ethical hacking - Footprinting.pptx

N
Nargis ParveenAsst. professor
FOOT PRINTING AND RECONNAISSANCE
INTRODUCTION OF FOOTPRINTING
Footprinting is an ethical hacking technique used to gather as much data as possible about a specific
targeted computer system, an infrastructure and networks to identify opportunities to penetrate
them. It is one of the best methods of finding vulnerabilities.
The process of cybersecurity footprinting involves profiling organizations and collecting data about
the network, host, employees and third-party partners. This information includes the OS used by the
organization, firewalls, network maps, IP addresses, domain name system information, security
configurations of the target machine, URLs, virtual private networks, staff IDs, email addresses and
phone numbers.
Types of Footprints
a) Active Footprinting: It means performing footprinting by getting
indirect touch with target machine.
b) Passive Footprinting: It means collecting information about a system
located at remote distance from the attacker
What is active & passive footprinting?
Active footprinting describes the process of using tools and techniques, like using
the traceroute commands or a ping sweep -- Internet Control Message Protocol sweep -- to
collect data about a specific target. This often triggers the target's intrusion detection system
(IDS). It takes a certain level of stealth and creativity to evade detection successfully.
 Passive footprinting involves collecting data about a specific target using innocuous methods,
like performing a Google search, looking through Archive.org, using NeoTrace, browsing through
employees' social media profiles, looking at job sites and using Whois, a website.
Ethical hacking - Footprinting.pptx
What Information Is Collected in Footprinting?
The goal of footprinting is to gather as much information about the target as possible in order to
increase the likelihood of success when actually planning and executing an attack. This includes
identifying any security weaknesses and gathering contact information for system administrators
and other users who may access sensitive data. During footprinting, various types of information
may be collected
 OS used by the organization,
 firewalls, network maps,
 IP addresses,
 domain name system information,
 security configurations of the target machine,
 URLs, virtual private networks, staff IDs,
 email addresses and phone numbers.
Digital footprint examples
Social media sites
• Social media credentials connecting other websites
• Posting pictures and sharing data on social accounts
• Communicating with friends and other contacts
Online Banking
• Use of a mobile application for online banking
• Getting subscriptions to blogs and financial publications
• Requesting a credit card account
Health
• Use of fitness trackers and wearable tech
• Using an email address for a gym registration
• Getting a subscription to health and fitness blogs
What are the steps of footprinting?
Information gathering.
Determining the range of the network.
Identifying active machines.
Identifying open ports and access points.
OS fingerprinting.
Fingerprinting services.
Mapping the network.
Advantages of Footprinting
1) It allows hackers to gather the basic security configurations of target machine.
2) It is best method of vulnerabilities.
3) By using this hacker identify as to which attacker is handier to hack the target system.
1 von 9

Recomendados

Footprinting and reconnaissance von
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissanceNishaYadav177
524 views8 Folien
Cybercrime and Security von
Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
1.5K views26 Folien
Footprinting von
FootprintingFootprinting
FootprintingDuah John
580 views9 Folien
Penetration testing von
Penetration testingPenetration testing
Penetration testingAmmar WK
2.6K views35 Folien
Social engineering von
Social engineeringSocial engineering
Social engineeringRobert Hood
2.5K views29 Folien
Ethical hacking - Skills.pptx von
Ethical hacking - Skills.pptxEthical hacking - Skills.pptx
Ethical hacking - Skills.pptxNargis Parveen
1K views19 Folien

Más contenido relacionado

Was ist angesagt?

Penetration Testing Basics von
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing BasicsRick Wanner
12.7K views62 Folien
What is pentest von
What is pentestWhat is pentest
What is pentestitissolutions
895 views16 Folien
Introduction to foot printing von
Introduction to foot printingIntroduction to foot printing
Introduction to foot printingCHETAN THAKRE
924 views14 Folien
Cyber security von
Cyber securityCyber security
Cyber securityManjushree Mashal
3.2K views41 Folien
Ethical hacking a licence to hack von
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hackDharmesh Makwana
3.2K views26 Folien
Ceh v5 module 04 enumeration von
Ceh v5 module 04 enumerationCeh v5 module 04 enumeration
Ceh v5 module 04 enumerationVi Tính Hoàng Nam
2.5K views33 Folien

Was ist angesagt?(20)

Penetration Testing Basics von Rick Wanner
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing Basics
Rick Wanner12.7K views
Introduction to foot printing von CHETAN THAKRE
Introduction to foot printingIntroduction to foot printing
Introduction to foot printing
CHETAN THAKRE924 views
Threat Hunting - Moving from the ad hoc to the formal von Priyanka Aash
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formal
Priyanka Aash1K views
Cyber security von ChethanMp7
Cyber securityCyber security
Cyber security
ChethanMp7644 views
Intrusion detection system von Aparna Bhadran
Intrusion detection systemIntrusion detection system
Intrusion detection system
Aparna Bhadran12.9K views
Ethical Hacking Powerpoint von Ren Tuazon
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
Ren Tuazon3.9K views
What is Penetration Testing? von btpsec
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?
btpsec7.5K views
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra... von Edureka!
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Edureka!2K views
Threat hunting - Every day is hunting season von Ben Boyd
Threat hunting - Every day is hunting seasonThreat hunting - Every day is hunting season
Threat hunting - Every day is hunting season
Ben Boyd323 views
Module 2_ Cyber offenses & Cybercrime.pptx von nikshaikh786
Module 2_ Cyber offenses & Cybercrime.pptxModule 2_ Cyber offenses & Cybercrime.pptx
Module 2_ Cyber offenses & Cybercrime.pptx
nikshaikh786173 views
Bsides 2019 - Intelligent Threat Hunting von Dhruv Majumdar
Bsides 2019 - Intelligent Threat HuntingBsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat Hunting
Dhruv Majumdar748 views
Anti forensics-techniques-for-browsing-artifacts von gaurang17
Anti forensics-techniques-for-browsing-artifactsAnti forensics-techniques-for-browsing-artifacts
Anti forensics-techniques-for-browsing-artifacts
gaurang174.9K views
Presentation on cyber security von 9784
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
97841.3K views

Similar a Ethical hacking - Footprinting.pptx

Survey on classification techniques for intrusion detection von
Survey on classification techniques for intrusion detectionSurvey on classification techniques for intrusion detection
Survey on classification techniques for intrusion detectioncsandit
534 views9 Folien
Footprintig (Haching) von
Footprintig (Haching)Footprintig (Haching)
Footprintig (Haching)Asif Iqbal
483 views11 Folien
Footprintig(Haching) von
Footprintig(Haching)Footprintig(Haching)
Footprintig(Haching)Asif Iqbal
77 views11 Folien
A Study on Data Mining Based Intrusion Detection System von
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemAM Publications
479 views5 Folien
A Study on Data Mining Based Intrusion Detection System von
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemAM Publications
339 views5 Folien
Cyber warfare introduction von
Cyber warfare introductionCyber warfare introduction
Cyber warfare introductionjagadeesh katla
657 views26 Folien

Similar a Ethical hacking - Footprinting.pptx(20)

Survey on classification techniques for intrusion detection von csandit
Survey on classification techniques for intrusion detectionSurvey on classification techniques for intrusion detection
Survey on classification techniques for intrusion detection
csandit534 views
Footprintig (Haching) von Asif Iqbal
Footprintig (Haching)Footprintig (Haching)
Footprintig (Haching)
Asif Iqbal483 views
Footprintig(Haching) von Asif Iqbal
Footprintig(Haching)Footprintig(Haching)
Footprintig(Haching)
Asif Iqbal77 views
A Study on Data Mining Based Intrusion Detection System von AM Publications
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection System
AM Publications479 views
A Study on Data Mining Based Intrusion Detection System von AM Publications
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection System
AM Publications339 views
Pattern Analysis and Signature Extraction for Intrusion Attacks on Web Services von IJNSA Journal
Pattern Analysis and Signature Extraction for Intrusion Attacks on Web ServicesPattern Analysis and Signature Extraction for Intrusion Attacks on Web Services
Pattern Analysis and Signature Extraction for Intrusion Attacks on Web Services
IJNSA Journal16 views
Internship ankita jain von Ankita Jain
Internship ankita jainInternship ankita jain
Internship ankita jain
Ankita Jain50 views
Information Technology Security Is Vital For The Success... von Brianna Johnson
Information Technology Security Is Vital For The Success...Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...
Brianna Johnson8 views
Knowledge base compound approach against phishing attacks using some parsing ... von csandit
Knowledge base compound approach against phishing attacks using some parsing ...Knowledge base compound approach against phishing attacks using some parsing ...
Knowledge base compound approach against phishing attacks using some parsing ...
csandit4.1K views
KNOWLEDGE BASE COMPOUND APPROACH AGAINST PHISHING ATTACKS USING SOME PARSING ... von cscpconf
KNOWLEDGE BASE COMPOUND APPROACH AGAINST PHISHING ATTACKS USING SOME PARSING ...KNOWLEDGE BASE COMPOUND APPROACH AGAINST PHISHING ATTACKS USING SOME PARSING ...
KNOWLEDGE BASE COMPOUND APPROACH AGAINST PHISHING ATTACKS USING SOME PARSING ...
cscpconf30 views
Penetration testing von PTC
Penetration testing Penetration testing
Penetration testing
PTC691 views
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx von SuhailShaik16
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptxINTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
SuhailShaik169 views
Web hacking 1.0 von Q Fadlan
Web hacking 1.0Web hacking 1.0
Web hacking 1.0
Q Fadlan725 views
Domain 2 of CEH v11 Reconnaissance Techniques (21%).pptx von Infosectrain3
Domain 2 of CEH v11 Reconnaissance Techniques (21%).pptxDomain 2 of CEH v11 Reconnaissance Techniques (21%).pptx
Domain 2 of CEH v11 Reconnaissance Techniques (21%).pptx
Infosectrain346 views
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES von AM Publications,India
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICESHOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES

Último

ppt_dunarea.pptx von
ppt_dunarea.pptxppt_dunarea.pptx
ppt_dunarea.pptxvvvgeorgevvv
68 views5 Folien
Meet the Bible von
Meet the BibleMeet the Bible
Meet the BibleSteve Thomason
83 views80 Folien
Interaction of microorganisms with Insects.pptx von
Interaction of microorganisms with Insects.pptxInteraction of microorganisms with Insects.pptx
Interaction of microorganisms with Insects.pptxMicrobiologyMicro
48 views14 Folien
Ask The Expert! Nonprofit Website Tools, Tips, and Technology.pdf von
 Ask The Expert! Nonprofit Website Tools, Tips, and Technology.pdf Ask The Expert! Nonprofit Website Tools, Tips, and Technology.pdf
Ask The Expert! Nonprofit Website Tools, Tips, and Technology.pdfTechSoup
67 views28 Folien
JRN 362 - Lecture Twenty-Three (Epilogue) von
JRN 362 - Lecture Twenty-Three (Epilogue)JRN 362 - Lecture Twenty-Three (Epilogue)
JRN 362 - Lecture Twenty-Three (Epilogue)Rich Hanley
44 views57 Folien
The Picture Of A Photograph von
The Picture Of A PhotographThe Picture Of A Photograph
The Picture Of A PhotographEvelyn Donaldson
38 views81 Folien

Último(20)

Interaction of microorganisms with Insects.pptx von MicrobiologyMicro
Interaction of microorganisms with Insects.pptxInteraction of microorganisms with Insects.pptx
Interaction of microorganisms with Insects.pptx
Ask The Expert! Nonprofit Website Tools, Tips, and Technology.pdf von TechSoup
 Ask The Expert! Nonprofit Website Tools, Tips, and Technology.pdf Ask The Expert! Nonprofit Website Tools, Tips, and Technology.pdf
Ask The Expert! Nonprofit Website Tools, Tips, and Technology.pdf
TechSoup 67 views
JRN 362 - Lecture Twenty-Three (Epilogue) von Rich Hanley
JRN 362 - Lecture Twenty-Three (Epilogue)JRN 362 - Lecture Twenty-Three (Epilogue)
JRN 362 - Lecture Twenty-Three (Epilogue)
Rich Hanley44 views
Introduction to Physiotherapy and Electrotherapy von Sreeraj S R
Introduction to Physiotherapy and ElectrotherapyIntroduction to Physiotherapy and Electrotherapy
Introduction to Physiotherapy and Electrotherapy
Sreeraj S R67 views
Creative Restart 2023: Christophe Wechsler - From the Inside Out: Cultivating... von Taste
Creative Restart 2023: Christophe Wechsler - From the Inside Out: Cultivating...Creative Restart 2023: Christophe Wechsler - From the Inside Out: Cultivating...
Creative Restart 2023: Christophe Wechsler - From the Inside Out: Cultivating...
Taste39 views
Boston In The American Revolution von Mary Brown
Boston In The American RevolutionBoston In The American Revolution
Boston In The American Revolution
Mary Brown38 views
Guidelines & Identification of Early Sepsis DR. NN CHAVAN 02122023.pptx von Niranjan Chavan
Guidelines & Identification of Early Sepsis DR. NN CHAVAN 02122023.pptxGuidelines & Identification of Early Sepsis DR. NN CHAVAN 02122023.pptx
Guidelines & Identification of Early Sepsis DR. NN CHAVAN 02122023.pptx
Niranjan Chavan43 views
NodeJS and ExpressJS.pdf von ArthyR3
NodeJS and ExpressJS.pdfNodeJS and ExpressJS.pdf
NodeJS and ExpressJS.pdf
ArthyR353 views
JRN 362 - Lecture Twenty-Two von Rich Hanley
JRN 362 - Lecture Twenty-TwoJRN 362 - Lecture Twenty-Two
JRN 362 - Lecture Twenty-Two
Rich Hanley39 views
GSoC 2024 .pdf von ShabNaz2
GSoC 2024 .pdfGSoC 2024 .pdf
GSoC 2024 .pdf
ShabNaz245 views
Guess Papers ADC 1, Karachi University von Khalid Aziz
Guess Papers ADC 1, Karachi UniversityGuess Papers ADC 1, Karachi University
Guess Papers ADC 1, Karachi University
Khalid Aziz109 views

Ethical hacking - Footprinting.pptx

  • 1. FOOT PRINTING AND RECONNAISSANCE
  • 2. INTRODUCTION OF FOOTPRINTING Footprinting is an ethical hacking technique used to gather as much data as possible about a specific targeted computer system, an infrastructure and networks to identify opportunities to penetrate them. It is one of the best methods of finding vulnerabilities. The process of cybersecurity footprinting involves profiling organizations and collecting data about the network, host, employees and third-party partners. This information includes the OS used by the organization, firewalls, network maps, IP addresses, domain name system information, security configurations of the target machine, URLs, virtual private networks, staff IDs, email addresses and phone numbers.
  • 3. Types of Footprints a) Active Footprinting: It means performing footprinting by getting indirect touch with target machine. b) Passive Footprinting: It means collecting information about a system located at remote distance from the attacker
  • 4. What is active & passive footprinting? Active footprinting describes the process of using tools and techniques, like using the traceroute commands or a ping sweep -- Internet Control Message Protocol sweep -- to collect data about a specific target. This often triggers the target's intrusion detection system (IDS). It takes a certain level of stealth and creativity to evade detection successfully.  Passive footprinting involves collecting data about a specific target using innocuous methods, like performing a Google search, looking through Archive.org, using NeoTrace, browsing through employees' social media profiles, looking at job sites and using Whois, a website.
  • 6. What Information Is Collected in Footprinting? The goal of footprinting is to gather as much information about the target as possible in order to increase the likelihood of success when actually planning and executing an attack. This includes identifying any security weaknesses and gathering contact information for system administrators and other users who may access sensitive data. During footprinting, various types of information may be collected  OS used by the organization,  firewalls, network maps,  IP addresses,  domain name system information,  security configurations of the target machine,  URLs, virtual private networks, staff IDs,  email addresses and phone numbers.
  • 7. Digital footprint examples Social media sites • Social media credentials connecting other websites • Posting pictures and sharing data on social accounts • Communicating with friends and other contacts Online Banking • Use of a mobile application for online banking • Getting subscriptions to blogs and financial publications • Requesting a credit card account Health • Use of fitness trackers and wearable tech • Using an email address for a gym registration • Getting a subscription to health and fitness blogs
  • 8. What are the steps of footprinting? Information gathering. Determining the range of the network. Identifying active machines. Identifying open ports and access points. OS fingerprinting. Fingerprinting services. Mapping the network.
  • 9. Advantages of Footprinting 1) It allows hackers to gather the basic security configurations of target machine. 2) It is best method of vulnerabilities. 3) By using this hacker identify as to which attacker is handier to hack the target system.