Foot Printing -All you need to know about

Chakradhar Chinni
2 min readFeb 17, 2021

--

Foot Printing is all about collecting the data of the target site, here our intention is to collect the data from multiple possible sources.

Foot Printing is mostly done by Ethical Hackers to identify the data which is available over the internet knowingly or unknowingly, and this data is collectively organized in a structured manner to identify the internal vulnerabilities of the system/software.

Vulnerability : Internal Weakness of the system

During this step, Ethical hackers would like to think from the perspective of a fraudster who is ready to attack the system/software, a strong analysis is made if someone could find a way to identify the vulnerability. If any vulnerability is identified then that would be immediately corrected by the Ethical Hackers team.

Foot Printing is also done by fraudsters to identify the vulnerabilities in the system so that if they could identify the vulnerability, they could easily gain access to the system or break into the software and gain control over it.

Vulnerabilities are more dangerous as they could allow an attacker to

.Install malware

.Perform SQL injection attack

.Perform Buffer Overflows

Active and Passive are the two types of Footprinting

Active Footprinting: Gathering the information about the system by directly communicating with the system

Passive Footprinting: Collecting the information from internet sources like OSINT, whoisdomaintools

Few Possible sources to collect the information:

OSINT Framework: This framework gives a lot of data about the target, we could easily find all the registered emails, contact details, addresses, people under an organization, and many more

Command Prompt: Few Commands helps us to find the IP address of the target

Nmap: It gives details like type of OS, software version, etc...

Zenmap: Similar to Nmap, here GUI is provided over CLI

--

--

Chakradhar Chinni
Chakradhar Chinni

Written by Chakradhar Chinni

Iam a pre-final year Computer science student with specialization in Cyber Security.

No responses yet