You are on page 1of 1
Printed by: ranarajnish2S@gmail.com. Printing is for personal, private use onily. No part of this book may be reproduced or transmitted without publisher's prior permission, Violators will be prosecuted. Footprinting Methodology ~ Now that you are familiar with footprintingieancepts and potential threats, we Wdiscuss the footprinting methodology. The footprinting methodology is a procedure "or collecting information about 2 target ion from all available sources,.[tyivolves gathering information about a target on such as URLs, locations, establishrhent detalls, number of employees, specific range of domain names, contact information, and other related information. Attackers colleetthis information from publicly acceSsiblé sources such as search engines, socal networking sites, Whois databases, and so on. The-diagram given below lustrates the commontechriques dSedt colt information about the trget organization rom diferent sources. y _/ ° Moda? Page 10 ecatnacing ad Coteau Cope © EE eam ‘Antigsroe Reproaucton Esta) ona

You might also like