2. Something about me :-
A cybersec enthusiast.
A budding programmer.
And the founder of Neo’s foundation.
3. Overview :-
What is Foot Printing ?
Objectives of Foot Printing
Different steps of Foot Printing
Foot Printing Methodologies
4. What is Foot Printing ?
Foot Printing is basically the first step where hacker gathers
as much information as possible to find ways to intrude into a
target system or at least decide what type of attacks will be
more suitable for the target.
Active Foot Printing
Passive Foot Printing
6. Different Steps of Foot Printing :-
EC–Council has divided Foot Printing into seven steps :-
Determining the Network range.
Identifying active machines.
Finding open ports and access points.
Mapping the network
7. Foot Printing Methodologies :-
Extract website information from WaybackMachine.
Collecting information From Email Header.
Foot Printing Through Social Engineering.
8. Way Back Machine :-
It is very easy to get a complete history of any website using
9. Who Is Lookup :-
Who is database gives a detailed information about a domain
name information including its owner, its registrar, date of
registration, expiry, name server, owner's contact
10. Nmap :-
Nmap (Network Mapper) is a security scanner, originally
written by Gordon Lyon, used to discover hosts and services
on a computer network, thus building a "map" of the network.
11. Foot Printing through Social
Social engineering is an art of exploiting human behavior to
extract confidential information.
Social engineers depend on the fact that people are unaware
of the valuable information and are careless about protecting