Attackers are aided in foot printing with the help of various tools. Many organizations offer that make information gathering an easy task. This section describe stools intended for obtaining information from various sources.
Foot printing tools are used to collect basic information about the target systems in order to Exploit them. Information collected by the foot printing tools contain target’s IP location information, routing information, business information, address, phone number and social security number, details about a source of an email and a file, DNS information, domain information and so on.
Footprinting is defined as the process of making a blueprint or map of an organization’s network and systems. operation is additionally referred to as footprinting an organization. Footprinting begins by determining the target system, application, or physical location of the target. Once this information is understood , specific information about the organization is gathered using non intrusive methods. for instance , the organization’s own website may provide a personnel directory or a list of employee bios, which can prove useful if the hacker must use a social-engineering attack to reach the objective.
The information the hacker is trying to find during the footprinting phase is anything that provides clues on the network architecture, server, and application types where valuable data is stored. Before an attack or exploit are often launched, the OS and version also as application types must be uncovered therefore the most effective attack are often launched against the target. Here are some of the pieces of data to be gathered about a target during footprinting:
- Domain name
- Network blocks
- Network services and applications
- System architecture
- Intrusion detection system
- Authentication mechanisms
- Specific IP addresses
- Access control mechanisms
- Phone numbers
- Contact addresses
Once this information is compiled, it can give a hacker better insight into the organization, where valuable information is stored, and how it can be accessed.
Footprinting Tools
Footprinting are often done using hacking tools, either applications or websites, which allow the hacker to locate information passively. By using these footprinting tools, a hacker can gain some basic information on, or “footprint,” the target. By first footprinting the target, a hacker can eliminate tools which will not work against the target systems or network. as an example, if a graphics design firm uses all Macintosh computers, then all hacking software that targets Windows systems are often eliminated. Footprinting not only speeds up the hacking process by eliminating certain toolsets but also minimizes the prospect of detection as fewer hacking attempts are often made by using the correct tool for the job.
Also Read : What is the Foot-printing?
For the exercises, you’ll perform reconnaissance and information gathering on a target company. i recommend you use your own organization, but because these tools are passive, any organization name are often used.
Some of the common tools used for footprinting and information gathering are as follows:
- Whois
- NSlookup
- Sam Spade
- SuperScan
- Nmap
- TcpView
- My ip Suite
- Dns enumerator
- Spider Foot
- Nessus
- Zone Transfer
- Port Scan
- HTTP Header Grabber
- Honeypot Detector
Different types of Foot printing tools:
Whois
A WHOIS lookup could be a way for you to search the general public database for information a few specific domain, like the expiration date, current registrar, registrant information, etc. once you enter a domain into the search bar at Uniregistry.com/whois, a request is sent to the general public WHOIS database of the domain’s registrar or registry and therefore the stored record is displayed.
NSlookup
nslookup is a simple but very practical command-line tool, which is principally wont to find the IP address that corresponds to a host, or the domain name that corresponds to an IP address (a process called “Reverse DNS Lookup”). nslookup allows itself to be used in the command-line of the OS in question; Windows users start the service via the command prompt, and Unix users via the terminal window.
Sam Spade
Sam Spade runs on all versions of Windows starting with Windows 95 and makes it simple to do a lot of investigation and analysis quickly, from determining the owner of a specific IP address block to examining the contents of an internet page. It also has several features that are specific to the detection of spam and sites that relay spam. sort of a real PI , Sam Spade doesn’t do anything that you couldn’t do yourself if you knew how and had the correct tools; this software integrates the capabilities found in ping, traceroute, time, whois, nslookup, finger, DIG, a packet sniffer, a port scanner, a scripting language, and more, all with a nice GUI to boot.
SuperScan
Download Super Scan from its new location and install it. SuperScan allows you to scan a variety of information processing addresses and do TCP port scanning. It will check all ports, or those you choose. it’s a awfully quick and powerful tool. you’ll be able to see a tutorial here and a youtube video, too.
Nmap
Download Nmap from its site. you’ll use it in each Windows and UNIX/Linux. It will do ping sweeps, OS identification, additionally to what is finished SuperScan. you’ll be able to see most of its choices and commands at its site choices outline. and a lot of details is seen in its on-line book version. after all you’ll be able to additionally see an youtube video on the nmap basics.
TcpView
TcpView may be a free tool for Windows that allows you to observe all open TCP and UDP ports on the native laptop. you’ll be able to transfer it from the Microsoft Sysinternals download website. As you’ll be able to see during this image it shows not solely the open ports, however additionally what application in your computer is coupled to the open ports. If a affiliation is established with a foreign host you’ll be able to see the remote host information processing range. TcpView isn’t a Intrusion Detection System, however provides an image of goes on in your laptop relating to to ports and refreshes mechanically, therefore you’ll be able to see the changes that are happening.
My ip Suite
Its combines domain-to-IP device, Batch Ping, Tracers, Whois, Website Scanner And connection Monitor in addition as an IP-to-country device into one Interface.
Dns enumerator
its AN automated sub-domain retrieval tool and it scan google to extract the result
Spider Foot
it will scarpe the the web site on it domain in addition as search Google, Netcraft, Whois and DNS to create up info
Nessus
Once you discover the list of open ports, future step is begin searching for vulnerability within the servers. one in all the efficient tools to vulnerability scan is Nessus. keep in mind that Nessus is not a free tool.
Related Product : Certified Ethical Hacker | CEH Certification
Zone Transfer
Searcher for the vulnerabilities in the DNS zone transfer.
Port Scan
Process a target system or a server for open ports in order to exploit them.
HTTP Header Grabber
Gathers information about a target system about the type And the version of software it is running.
Honeypot Detector
Detects the presence of honeypot in a target’s system. A Honeypot contains a data about the system that looks legitimate and is monitored continuously in order to detect any malicious activity which is blocked afterwards.
Questions related to this topic
- Can I use 8.8 8.8 DNS?
- What port does Google use?
- Is port 80 TCP or UDP?
- How do I find the URL port number?
Learn CEH & Think like hacker
- What is Ethical Hacking? & Types of Hacking
- 5 Phases of Hacking
- 8 Most Common Types of Hacker Motivations
- What are different types of attacks on a system
- Scope and Limitations of Ethical Hacking
- TEN Different Types Of Hackers
- What is the Foot-printing?
- Top 12 steps for Foot printing Penetration Testing
- Different types of tools with Email Foot printing
- What is “Anonymizer” & Types of Anonymizers
- Top DNS Interrogation Tools
- What is SNMP Enumeration?
- Top vulnerability scanning tools
- Information Security of Threat
- Foot printing tools:
- What is Enumeration?
- Network Security Controls
- What is Identity and Access Management?
- OWASP high TEN web application security risks
- Password Attacks
- Defend Against Key loggers
- Defend Against Spyware
- Covering Tracks
- Covering Track on Networks
- Everything You Need To Know About Sniffing – Part 1
- Everything You Need To Know About Sniffing – Part 2
- Learn more about GPS Spyware & Apparatuses
- Introduction of USB Spyware and It’s types
- 10 Types of Identity Theft You Should Know About
- Concepts of Denial-of-Service Attack & Distributed Denial of Service Attack
- Most Effective Ways to Overcome Impersonation on Social Networking Site’s Problem
- How Dynamic Host Configuration Protocol (DHCP) Works
- DHCP Request/Reply Messages
- DHCP Starvation Attack
- Rogue DHCP Server Attack
- IOS Switch Commands
- Web Server Concept
- Web Server Attacks
- Web Server Attack Tools
- Web Server Security Tools
- 6 Quick Methodology For Web Server Attack
- Learn Skills From Web Server Foot Printing / Banner Grapping
- The 10 Secrets You Will Never Know About Cyber Security And Its Important?
- Ways To Learn Finding Default Content Of Web Server Effectively
- How will Social Engineering be in the Future
- Understand The Background Of Top 9 Challenges IT Leaders Will Face In 2020 Now
- Learning Good Ways To Protect Yourself From Identity Theft
- Anti-phishing Tools Guide
This Blog Article is posted by
Infosavvy, 2nd Floor, Sai Niketan, Chandavalkar Road Opp. Gora Gandhi Hotel, Above Jumbo King, beside Speakwell Institute, Borivali West, Mumbai, Maharashtra 400092
Contact us – www.info-savvy.com