What is the first step one would take before seeking admission in a university or collage? Quite unanimously, it must be a primary research about the institute.Footprinting is an analogous step which hackers take before gaining access into any network. The systematic foot printing of a organization enables attackers to create a complete profile of an organization,s security posture like system architecture, network blocks and IP address exposed on the internet. Hackers gain reconnaissance of the target following a sequence of steps as:
1 open source footprinting the frist step a hacker takes is to visit the website of a potential target. He then looks for contact information of the administrators which may help in gusseing the password or in social Engineering.
1 Network Enumeration this the next step in gaining information where the hacker tries to identify the domain names and the network blocks of the target network.
1 Scanning Once the network blockis known, the next step is to spy for active IP address on the target network. The internet control Message Protocol (ICMP) is a good alternative for identifying active IP addresses.
1 open source footprinting the frist step a hacker takes is to visit the website of a potential target. He then looks for contact information of the administrators which may help in gusseing the password or in social Engineering.
1 Network Enumeration this the next step in gaining information where the hacker tries to identify the domain names and the network blocks of the target network.
1 Scanning Once the network blockis known, the next step is to spy for active IP address on the target network. The internet control Message Protocol (ICMP) is a good alternative for identifying active IP addresses.
No comments:
Post a Comment