Ethical hacking - Footprinting.pptx

N
Nargis ParveenAsst. professor
FOOT PRINTING AND RECONNAISSANCE
INTRODUCTION OF FOOTPRINTING
Footprinting is an ethical hacking technique used to gather as much data as possible about a specific
targeted computer system, an infrastructure and networks to identify opportunities to penetrate
them. It is one of the best methods of finding vulnerabilities.
The process of cybersecurity footprinting involves profiling organizations and collecting data about
the network, host, employees and third-party partners. This information includes the OS used by the
organization, firewalls, network maps, IP addresses, domain name system information, security
configurations of the target machine, URLs, virtual private networks, staff IDs, email addresses and
phone numbers.
Types of Footprints
a) Active Footprinting: It means performing footprinting by getting
indirect touch with target machine.
b) Passive Footprinting: It means collecting information about a system
located at remote distance from the attacker
What is active & passive footprinting?
Active footprinting describes the process of using tools and techniques, like using
the traceroute commands or a ping sweep -- Internet Control Message Protocol sweep -- to
collect data about a specific target. This often triggers the target's intrusion detection system
(IDS). It takes a certain level of stealth and creativity to evade detection successfully.
 Passive footprinting involves collecting data about a specific target using innocuous methods,
like performing a Google search, looking through Archive.org, using NeoTrace, browsing through
employees' social media profiles, looking at job sites and using Whois, a website.
Ethical hacking - Footprinting.pptx
What Information Is Collected in Footprinting?
The goal of footprinting is to gather as much information about the target as possible in order to
increase the likelihood of success when actually planning and executing an attack. This includes
identifying any security weaknesses and gathering contact information for system administrators
and other users who may access sensitive data. During footprinting, various types of information
may be collected
 OS used by the organization,
 firewalls, network maps,
 IP addresses,
 domain name system information,
 security configurations of the target machine,
 URLs, virtual private networks, staff IDs,
 email addresses and phone numbers.
Digital footprint examples
Social media sites
• Social media credentials connecting other websites
• Posting pictures and sharing data on social accounts
• Communicating with friends and other contacts
Online Banking
• Use of a mobile application for online banking
• Getting subscriptions to blogs and financial publications
• Requesting a credit card account
Health
• Use of fitness trackers and wearable tech
• Using an email address for a gym registration
• Getting a subscription to health and fitness blogs
What are the steps of footprinting?
Information gathering.
Determining the range of the network.
Identifying active machines.
Identifying open ports and access points.
OS fingerprinting.
Fingerprinting services.
Mapping the network.
Advantages of Footprinting
1) It allows hackers to gather the basic security configurations of target machine.
2) It is best method of vulnerabilities.
3) By using this hacker identify as to which attacker is handier to hack the target system.
1 of 9

Recommended

Bsides 2019 - Intelligent Threat Hunting by
Bsides 2019 - Intelligent Threat HuntingBsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat HuntingDhruv Majumdar
747 views21 slides
Threat hunting in cyber world by
Threat hunting in cyber worldThreat hunting in cyber world
Threat hunting in cyber worldAkash Sarode
820 views50 slides
Detection Rules Coverage by
Detection Rules CoverageDetection Rules Coverage
Detection Rules CoverageSunny Neo
1.2K views69 slides
Ethical hacking - Skills.pptx by
Ethical hacking - Skills.pptxEthical hacking - Skills.pptx
Ethical hacking - Skills.pptxNargis Parveen
1K views19 slides
Effective Threat Hunting with Tactical Threat Intelligence by
Effective Threat Hunting with Tactical Threat IntelligenceEffective Threat Hunting with Tactical Threat Intelligence
Effective Threat Hunting with Tactical Threat IntelligenceDhruv Majumdar
363 views19 slides
Threat hunting - Every day is hunting season by
Threat hunting - Every day is hunting seasonThreat hunting - Every day is hunting season
Threat hunting - Every day is hunting seasonBen Boyd
320 views21 slides

More Related Content

What's hot

Osint presentation nov 2019 by
Osint presentation nov 2019Osint presentation nov 2019
Osint presentation nov 2019Priyanka Aash
5.1K views12 slides
Cyber Threat Intelligence by
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat IntelligencePrachi Mishra
7K views32 slides
Threat Intelligence by
Threat IntelligenceThreat Intelligence
Threat IntelligenceDeepak Kumar (D3)
3.3K views17 slides
Cyber Threat Intelligence by
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat IntelligenceZaiffiEhsan
217 views8 slides
Footprinting and reconnaissance by
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissanceNishaYadav177
495 views8 slides
Threat Intelligence 101 - Steve Lodin - Submitted by
Threat Intelligence 101 - Steve Lodin - SubmittedThreat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedSteve Lodin
1.1K views48 slides

What's hot(20)

Osint presentation nov 2019 by Priyanka Aash
Osint presentation nov 2019Osint presentation nov 2019
Osint presentation nov 2019
Priyanka Aash5.1K views
Cyber Threat Intelligence by ZaiffiEhsan
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
ZaiffiEhsan217 views
Footprinting and reconnaissance by NishaYadav177
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissance
NishaYadav177495 views
Threat Intelligence 101 - Steve Lodin - Submitted by Steve Lodin
Threat Intelligence 101 - Steve Lodin - SubmittedThreat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - Submitted
Steve Lodin1.1K views
Cyber Threat Hunting: Identify and Hunt Down Intruders by Infosec
Cyber Threat Hunting: Identify and Hunt Down IntrudersCyber Threat Hunting: Identify and Hunt Down Intruders
Cyber Threat Hunting: Identify and Hunt Down Intruders
Infosec737 views
Cyber Security Incident Response by PECB
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
PECB 11K views
Cyber Threat Intelligence by mohamed nasri
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
mohamed nasri7.4K views
Threat hunting 101 by Sandeep Singh by OWASP Delhi
Threat hunting 101 by Sandeep SinghThreat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep Singh
OWASP Delhi1.3K views
Footprinting by Duah John
FootprintingFootprinting
Footprinting
Duah John571 views
Penetration Testing Basics by Rick Wanner
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing Basics
Rick Wanner12.7K views
Cyber Threat Hunting with Phirelight by Hostway|HOSTING
Cyber Threat Hunting with PhirelightCyber Threat Hunting with Phirelight
Cyber Threat Hunting with Phirelight
Hostway|HOSTING1.4K views
Threat Hunting Procedures and Measurement Matrice by Vishal Kumar
Threat Hunting Procedures and Measurement MatriceThreat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement Matrice
Vishal Kumar1.1K views
VAPT - Vulnerability Assessment & Penetration Testing by Netpluz Asia Pte Ltd
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing
Threat hunting for Beginners by SKMohamedKasim
Threat hunting for BeginnersThreat hunting for Beginners
Threat hunting for Beginners
SKMohamedKasim466 views

Similar to Ethical hacking - Footprinting.pptx

Survey on classification techniques for intrusion detection by
Survey on classification techniques for intrusion detectionSurvey on classification techniques for intrusion detection
Survey on classification techniques for intrusion detectioncsandit
534 views9 slides
Footprintig (Haching) by
Footprintig (Haching)Footprintig (Haching)
Footprintig (Haching)Asif Iqbal
483 views11 slides
Footprintig(Haching) by
Footprintig(Haching)Footprintig(Haching)
Footprintig(Haching)Asif Iqbal
77 views11 slides
A Study on Data Mining Based Intrusion Detection System by
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemAM Publications
479 views5 slides
A Study on Data Mining Based Intrusion Detection System by
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemAM Publications
339 views5 slides
Cyber warfare introduction by
Cyber warfare introductionCyber warfare introduction
Cyber warfare introductionjagadeesh katla
657 views26 slides

Similar to Ethical hacking - Footprinting.pptx(20)

Survey on classification techniques for intrusion detection by csandit
Survey on classification techniques for intrusion detectionSurvey on classification techniques for intrusion detection
Survey on classification techniques for intrusion detection
csandit534 views
Footprintig (Haching) by Asif Iqbal
Footprintig (Haching)Footprintig (Haching)
Footprintig (Haching)
Asif Iqbal483 views
Footprintig(Haching) by Asif Iqbal
Footprintig(Haching)Footprintig(Haching)
Footprintig(Haching)
Asif Iqbal77 views
A Study on Data Mining Based Intrusion Detection System by AM Publications
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection System
AM Publications479 views
A Study on Data Mining Based Intrusion Detection System by AM Publications
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection System
AM Publications339 views
Pattern Analysis and Signature Extraction for Intrusion Attacks on Web Services by IJNSA Journal
Pattern Analysis and Signature Extraction for Intrusion Attacks on Web ServicesPattern Analysis and Signature Extraction for Intrusion Attacks on Web Services
Pattern Analysis and Signature Extraction for Intrusion Attacks on Web Services
IJNSA Journal16 views
Internship ankita jain by Ankita Jain
Internship ankita jainInternship ankita jain
Internship ankita jain
Ankita Jain50 views
Information Technology Security Is Vital For The Success... by Brianna Johnson
Information Technology Security Is Vital For The Success...Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...
Brianna Johnson8 views
Knowledge base compound approach against phishing attacks using some parsing ... by csandit
Knowledge base compound approach against phishing attacks using some parsing ...Knowledge base compound approach against phishing attacks using some parsing ...
Knowledge base compound approach against phishing attacks using some parsing ...
csandit4.1K views
KNOWLEDGE BASE COMPOUND APPROACH AGAINST PHISHING ATTACKS USING SOME PARSING ... by cscpconf
KNOWLEDGE BASE COMPOUND APPROACH AGAINST PHISHING ATTACKS USING SOME PARSING ...KNOWLEDGE BASE COMPOUND APPROACH AGAINST PHISHING ATTACKS USING SOME PARSING ...
KNOWLEDGE BASE COMPOUND APPROACH AGAINST PHISHING ATTACKS USING SOME PARSING ...
cscpconf30 views
Penetration testing by PTC
Penetration testing Penetration testing
Penetration testing
PTC691 views
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx by SuhailShaik16
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptxINTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
SuhailShaik169 views
Web hacking 1.0 by Q Fadlan
Web hacking 1.0Web hacking 1.0
Web hacking 1.0
Q Fadlan721 views
Domain 2 of CEH v11 Reconnaissance Techniques (21%).pptx by Infosectrain3
Domain 2 of CEH v11 Reconnaissance Techniques (21%).pptxDomain 2 of CEH v11 Reconnaissance Techniques (21%).pptx
Domain 2 of CEH v11 Reconnaissance Techniques (21%).pptx
Infosectrain346 views
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES by AM Publications,India
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICESHOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES

Recently uploaded

AI Tools for Business and Startups by
AI Tools for Business and StartupsAI Tools for Business and Startups
AI Tools for Business and StartupsSvetlin Nakov
101 views39 slides
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively by
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyPECB
545 views18 slides
Psychology KS4 by
Psychology KS4Psychology KS4
Psychology KS4WestHatch
68 views4 slides
ACTIVITY BOOK key water sports.pptx by
ACTIVITY BOOK key water sports.pptxACTIVITY BOOK key water sports.pptx
ACTIVITY BOOK key water sports.pptxMar Caston Palacio
430 views4 slides
CWP_23995_2013_17_11_2023_FINAL_ORDER.pdf by
CWP_23995_2013_17_11_2023_FINAL_ORDER.pdfCWP_23995_2013_17_11_2023_FINAL_ORDER.pdf
CWP_23995_2013_17_11_2023_FINAL_ORDER.pdfSukhwinderSingh895865
507 views6 slides
Plastic waste.pdf by
Plastic waste.pdfPlastic waste.pdf
Plastic waste.pdfalqaseedae
125 views5 slides

Recently uploaded(20)

AI Tools for Business and Startups by Svetlin Nakov
AI Tools for Business and StartupsAI Tools for Business and Startups
AI Tools for Business and Startups
Svetlin Nakov101 views
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively by PECB
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
PECB 545 views
Psychology KS4 by WestHatch
Psychology KS4Psychology KS4
Psychology KS4
WestHatch68 views
Plastic waste.pdf by alqaseedae
Plastic waste.pdfPlastic waste.pdf
Plastic waste.pdf
alqaseedae125 views
Scope of Biochemistry.pptx by shoba shoba
Scope of Biochemistry.pptxScope of Biochemistry.pptx
Scope of Biochemistry.pptx
shoba shoba124 views
Classification of crude drugs.pptx by GayatriPatra14
Classification of crude drugs.pptxClassification of crude drugs.pptx
Classification of crude drugs.pptx
GayatriPatra1477 views
American Psychological Association 7th Edition.pptx by SamiullahAfridi4
American Psychological Association  7th Edition.pptxAmerican Psychological Association  7th Edition.pptx
American Psychological Association 7th Edition.pptx
SamiullahAfridi482 views
Compare the flora and fauna of Kerala and Chhattisgarh ( Charttabulation) by AnshulDewangan3
 Compare the flora and fauna of Kerala and Chhattisgarh ( Charttabulation) Compare the flora and fauna of Kerala and Chhattisgarh ( Charttabulation)
Compare the flora and fauna of Kerala and Chhattisgarh ( Charttabulation)
AnshulDewangan3316 views
11.28.23 Social Capital and Social Exclusion.pptx by mary850239
11.28.23 Social Capital and Social Exclusion.pptx11.28.23 Social Capital and Social Exclusion.pptx
11.28.23 Social Capital and Social Exclusion.pptx
mary850239281 views
Community-led Open Access Publishing webinar.pptx by Jisc
Community-led Open Access Publishing webinar.pptxCommunity-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptx
Jisc74 views
Education and Diversity.pptx by DrHafizKosar
Education and Diversity.pptxEducation and Diversity.pptx
Education and Diversity.pptx
DrHafizKosar118 views
Structure and Functions of Cell.pdf by Nithya Murugan
Structure and Functions of Cell.pdfStructure and Functions of Cell.pdf
Structure and Functions of Cell.pdf
Nithya Murugan368 views
Solar System and Galaxies.pptx by DrHafizKosar
Solar System and Galaxies.pptxSolar System and Galaxies.pptx
Solar System and Galaxies.pptx
DrHafizKosar85 views
Universe revised.pdf by DrHafizKosar
Universe revised.pdfUniverse revised.pdf
Universe revised.pdf
DrHafizKosar112 views

Ethical hacking - Footprinting.pptx

  • 1. FOOT PRINTING AND RECONNAISSANCE
  • 2. INTRODUCTION OF FOOTPRINTING Footprinting is an ethical hacking technique used to gather as much data as possible about a specific targeted computer system, an infrastructure and networks to identify opportunities to penetrate them. It is one of the best methods of finding vulnerabilities. The process of cybersecurity footprinting involves profiling organizations and collecting data about the network, host, employees and third-party partners. This information includes the OS used by the organization, firewalls, network maps, IP addresses, domain name system information, security configurations of the target machine, URLs, virtual private networks, staff IDs, email addresses and phone numbers.
  • 3. Types of Footprints a) Active Footprinting: It means performing footprinting by getting indirect touch with target machine. b) Passive Footprinting: It means collecting information about a system located at remote distance from the attacker
  • 4. What is active & passive footprinting? Active footprinting describes the process of using tools and techniques, like using the traceroute commands or a ping sweep -- Internet Control Message Protocol sweep -- to collect data about a specific target. This often triggers the target's intrusion detection system (IDS). It takes a certain level of stealth and creativity to evade detection successfully.  Passive footprinting involves collecting data about a specific target using innocuous methods, like performing a Google search, looking through Archive.org, using NeoTrace, browsing through employees' social media profiles, looking at job sites and using Whois, a website.
  • 6. What Information Is Collected in Footprinting? The goal of footprinting is to gather as much information about the target as possible in order to increase the likelihood of success when actually planning and executing an attack. This includes identifying any security weaknesses and gathering contact information for system administrators and other users who may access sensitive data. During footprinting, various types of information may be collected  OS used by the organization,  firewalls, network maps,  IP addresses,  domain name system information,  security configurations of the target machine,  URLs, virtual private networks, staff IDs,  email addresses and phone numbers.
  • 7. Digital footprint examples Social media sites • Social media credentials connecting other websites • Posting pictures and sharing data on social accounts • Communicating with friends and other contacts Online Banking • Use of a mobile application for online banking • Getting subscriptions to blogs and financial publications • Requesting a credit card account Health • Use of fitness trackers and wearable tech • Using an email address for a gym registration • Getting a subscription to health and fitness blogs
  • 8. What are the steps of footprinting? Information gathering. Determining the range of the network. Identifying active machines. Identifying open ports and access points. OS fingerprinting. Fingerprinting services. Mapping the network.
  • 9. Advantages of Footprinting 1) It allows hackers to gather the basic security configurations of target machine. 2) It is best method of vulnerabilities. 3) By using this hacker identify as to which attacker is handier to hack the target system.