You are on page 1of 1
Printed by: ranarajnish2S@gmail.com. Printing is for personal, private use onily. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted. Fonisrmane ana feconavonce ©. Patents and trademarks related to the organization ‘Attackers can access organizational information and use such information to identify key personnel and launch social engineering attacks to extract sensitive data about the entity. Network Information: You can gather network information by performing Whois database analysis, trace routing, and so on. ‘The information collected includes: (© Domain and sub-domains Network blocks , Network topology, trusted routers, and firewalls IP addresses of the reachable systems Whois records y (© DNS records and related information. + System Information: You can gather system/information by performing network footprinting, ONS footprinting. website footpfting, emall footprinting, and son, ‘The information collected includes: © Web server 0 oo 0 ° © Location of web servers > © Publicly avalable etal aguresses © Usernamesipassivords, and s0 on. Objectives of Footprinting Y To bull a hacking strate, attackers must gather informaljon about the target organization's network. They then use such information to identify, the easiest way to break through the organization's secbrity perimeter. As mentioned previously, the footprinting methodology makes it easy to gather information about the target orgafvdation and plays a vital ole inthe hacking process. Y 2 \ Footbyinting provides an outline of the seeufity posture, such as the placement of firewalls, proxies, and other security solutions. Hatkers can analyze the footprinting report to identify loopholes in the security posture ofthe target organization and build hacking plan accordingly. By using @ combination of tools"and techniques, attackers can take an unknown entity (for example, XYZ Organization) and reduce it to a specific range of domain names, network blocks, and individual IP addresses of systems directly connected to the Internet, in addition to other Getails pertaining tos security posture. A detailed footprint provides maximal information about the target organization, allowing the attacker to identity vulnerabilities inthe target systems to select appropriate exploits. Attackers can build their own information database regarding the security weaknesses of the target Moda? age 08 ecatnacing ad Coteau Cope © EE eam ‘Antigsroe Reproaucton Esta) ona

You might also like