2. Something about me :-
A cybersec enthusiast.
A budding programmer.
A dancer.
And the founder of Neo’s foundation.
3. Overview :-
What is Foot Printing ?
Objectives of Foot Printing
Different steps of Foot Printing
Foot Printing Methodologies
4. What is Foot Printing ?
Foot Printing is basically the first step where hacker gathers
as much information as possible to find ways to intrude into a
target system or at least decide what type of attacks will be
more suitable for the target.
Active Foot Printing
Passive Foot Printing
6. Different Steps of Foot Printing :-
EC–Council has divided Foot Printing into seven steps :-
Information Gathering
Determining the Network range.
Identifying active machines.
Finding open ports and access points.
OS fingerprinting
Fingerprinting services
Mapping the network
7. Foot Printing Methodologies :-
Extract website information from WaybackMachine.
WhoIs Lookup.
Nmap .
Collecting information From Email Header.
Traceroute.
Foot Printing Through Social Engineering.
8. Way Back Machine :-
It is very easy to get a complete history of any website using
www.archive.org
9. Who Is Lookup :-
Who is database gives a detailed information about a domain
name information including its owner, its registrar, date of
registration, expiry, name server, owner's contact
information, etc.
10. Nmap :-
Nmap (Network Mapper) is a security scanner, originally
written by Gordon Lyon, used to discover hosts and services
on a computer network, thus building a "map" of the network.
11. Foot Printing through Social
Engineering :-
Social engineering is an art of exploiting human behavior to
extract confidential information.
Social engineers depend on the fact that people are unaware
of the valuable information and are careless about protecting
it.
12. Social Engineering Techniques :-
Eavesdropping
Shoulder Surfing
Dumpster Diving
Impersonation on social networking sites