Ethical Hacking – Footprinting

Last updated on Nov 22 2021
Deepali Gupta

Table of Contents

Ethical Hacking – Footprinting

Footprinting may be a part of reconnaissance process which is employed for gathering possible information a few target computing system or network. Footprinting might be both passive and active. Reviewing a company’s website is an example of passive footprinting, whereas attempting to realize access to sensitive information through social engineering is an example of active operation.

Footprinting is essentially the primary step where hacker gathers the maximum amount information as possible to seek out ways to poke into a target system or a minimum of decide what sort of attacks are going to be more suitable for the target.

During this phase, a hacker can collect the subsequent information −

  • Domain name
  • IP Addresses
  • Namespaces
  • Employee information
  • Phone numbers
  • E-mails
  • Job Information

In the following section, we’ll discuss the way to extract the essential and simply accessible information about any computing system or network that’s linked to the web .

Domain Name Information

You can use http://www.whois.com/whois website to urge detailed information a few name information including its owner, its registrar, date of registration, expiry, name server, owner’s contact information, etc.

 

image1 10

Quick Fix

It’s always recommended to stay your name profile a personal one which should hide the above-mentioned information from potential hackers.

Finding IP Address

You can use ping command at your prompt. This command is out there on Windows also as on Linux OS. Following is that the example to seek out out the IP address of tecklearn.com

$ping tecklearn.com

It will produce the subsequent result −

PING tecklearn.com (66.135.33.172) 56(84) bytes of knowledge .
64 bytes from 66.135.33.172: icmp_seq = 1 ttl = 64 time = 0.028 ms
64 bytes from 66.135.33.172: icmp_seq = 2 ttl = 64 time = 0.021 ms
64 bytes from 66.135.33.172: icmp_seq = 3 ttl = 64 time = 0.021 ms
64 bytes from 66.135.33.172: icmp_seq = 4 ttl = 64 time = 0.021 ms
Finding Hosting Company

Once you’ve got the web site address, you’ll get further detail by using ip2location.com website. Following is that the example to seek out out the small print of an IP address −

image2 9

Here the ISP row gives you the detail about the hosting company because IP addresses are usually provided by hosting companies only.

Quick Fix

If a computing system or network is linked with the web directly, then you can’t hide the IP address and therefore the related information like the hosting company, its location, ISP, etc. If you’ve got a server containing very sensitive data, then it’s recommended to stay it behind a secure proxy in order that hackers cannot get the precise details of your actual server. This way, it’ll be difficult for any potential hacker to succeed in your server directly.

Another effective way of hiding your system IP and ultimately all the associated information is to travel through a Virtual Private Network (VPN). If you configure a VPN, then the entire traffic routes through the VPN network, so your true IP address assigned by your ISP is usually hidden.

IP Address Ranges

Small sites may have one IP address related to them, but larger websites usually have multiple IP addresses serving different domains and sub-domains.

You can obtain a variety of IP addresses assigned to a specific company using American Registry for Internet Numbers (ARIN).

image3 7

You can enter name within the highlighted search box to seek out out an inventory of all the assigned IP addresses thereto company.

History of the web site

It is very easy to urge an entire history of any website using www.archive.org.

image4 5

You can enter a website name within the search box to seek out out how the web site was watching a given point of your time and what were the pages available on the web site on different dates.

Quick Fix

Though there are some advantages of keeping your website in an archive database, but if you are doing not like anybody to ascertain how your website progressed through different stages, then you’ll request archive.org to delete the history of your website.

So, this brings us to the end of blog. This Tecklearn ‘Footprinting in Ethical Hacking’ blog helps you with commonly asked questions if you are looking out for a job in Cyber Security. If you wish to learn Ethical Hacking and build a career in Cyber Security domain, then check out our interactive, Certified Ethical Hacker Training, that comes with 24*7 support to guide you throughout your learning period. Please find the link for course details:

 

https://www.tecklearn.com/course/certified-ethical-hacker-training/

Certified Ethical Hacker Training

About the Course

Tecklearn’s CEH certification training course provides you the hands-on training required to master the techniques hackers use to penetrate network systems and fortify your system against it. In this training, you will master how to identify security vulnerabilities by inspecting network infrastructures and defend the malicious hacker with essential tools and techniques, advanced network packet analysis and system penetration testing techniques to build your network security skill-set and prevent hackers. We will train you on the advanced step-by-step methodologies that hackers actually use such as writing virus codes and reverse engineering so you can better protect corporate infrastructure from data breaches.

Why Should you take Certified Ethical Hacker Training?

  • The average salary for a Cybersecurity Specialist is $110,881 per year in the United States and INR 900,000 per year in India – Indeed.com
  • Global Cybersecurity industry is estimated to cross US$ 220 billion by 2021.
  • Today cyber security is one of the most important aspects for any organization. In today’s digitally-driven world every organization needs professionals who can keep the hackers at bay. Hence the salaries for certified ethical hackers are among the best in the industry.

What you will Learn in this Course?

Introduction to Ethical hacking

  • Scope of ethical hacking
  • Enterprise information security architecture
  • Introduction and PCI Data Security Standard Overview
  • Role of Security and Penetration Testers
  • Vulnerability assessment
  • Various cyber security laws
  • Penetration testing

Various aspects of Information Security

  • Information security attacks
  • OS attacks
  • Application level attacks
  • Phases and Concepts of Hacking
  • Information Security Law and Standards

System Hacking

  • What is System Hacking
  • Goals of System Hacking
  • Understanding the certified ethical hacker methodology
  • About Kali Linux
  • Hands On

Technology Standards

  • Introduction to F5 Technology and Terms
  • POS (Point of Sale ) , mPoS
  • What is GLBA Compliance
  • OWASP
  • Site monitoring Tools
  • Introduction to PCI DSS Standard

Semantics and Introduction to Footprinting

  • What is Semantics
  • Fuzzy Logic
  • Footprinting

Threats

  • Types of Threats
  • Threats against the Application
  • Threat modelling
  • Hands on

Threat modelling

  • Threat modelling with STRIDE model
  • Ways to Find Security Issues
  • Penetration Testing Tools
  • Modelling Models – Whiteboard Diagrams, Brainstorming, Structured Diagrams etc.
  • Trust Boundaries
  • Threat Trees
  • DREAD Model

Example of Attack

Vulnerability Scanning Tools

  • OpenVAS
  • Wapiti
  • Burp Suite Community
  • Metasploit

Threat Modelling with Different models

  • Various Threat Models
  • PASTA Model in Depth

Advanced concepts like network packet analysis

  • Network scanning
  • How to scan the network, overview of scanning
  • WireShark
  • Sniffing attacks
  • File Signature

Got a question for us? Please mention it in the comments section and we will get back to you.

0 responses on "Ethical Hacking - Footprinting"

Leave a Message

Your email address will not be published. Required fields are marked *