Foot printing tools

Attackers are aided in foot printing with the help of various tools. Many organizations offer that make information gathering an easy task. This section describe stools intended for obtaining information from various sources.
Foot printing tools are used to collect basic information about the target systems in order to Exploit them. Information collected by the foot printing tools contain target’s IP location information, routing information, business information, address, phone number and social security number, details about a source of an email and a file, DNS information, domain information and so on.

Footprinting is defined as the process of making a blueprint or map of an organization’s network and systems. operation is additionally referred to as footprinting an organization. Footprinting begins by determining the target system, application, or physical location of the target. Once this information is understood , specific information about the organization is gathered using non intrusive methods. for instance , the organization’s own website may provide a personnel directory or a list of employee bios, which can prove useful if the hacker must use a social-engineering attack to reach the objective.

The information the hacker is trying to find during the footprinting phase is anything that provides clues on the network architecture, server, and application types where valuable data is stored. Before an attack or exploit are often launched, the OS and version also as application types must be uncovered therefore the most effective attack are often launched against the target. Here are some of the pieces of data to be gathered about a target during footprinting:

  • Domain name
  • Network blocks
  • Network services and applications
  • System architecture
  • Intrusion detection system
  • Authentication mechanisms
  • Specific IP addresses
  • Access control mechanisms
  • Phone numbers
  • Contact addresses

Once this information is compiled, it can give a hacker better insight into the organization, where valuable information is stored, and how it can be accessed.

Footprinting Tools

Footprinting are often done using hacking tools, either applications or websites, which allow the hacker to locate information passively. By using these footprinting tools, a hacker can gain some basic information on, or “footprint,” the target. By first footprinting the target, a hacker can eliminate tools which will not work against the target systems or network. as an example, if a graphics design firm uses all Macintosh computers, then all hacking software that targets Windows systems are often eliminated. Footprinting not only speeds up the hacking process by eliminating certain toolsets but also minimizes the prospect of detection as fewer hacking attempts are often made by using the correct tool for the job.

Also Read :  What is the Foot-printing?

For the exercises, you’ll perform reconnaissance and information gathering on a target company. i recommend you use your own organization, but because these tools are passive, any organization name are often used.

Some of the common tools used for footprinting and information gathering are as follows:

  • Whois
  • NSlookup
  • Sam Spade
  • SuperScan
  • Nmap
  • TcpView
  • My ip Suite
  • Dns enumerator
  • Spider Foot
  • Nessus
  • Zone Transfer
  • Port Scan
  • HTTP Header Grabber
  • Honeypot Detector

Different types of Foot printing tools:


A WHOIS lookup could be a way for you to search the general public database for information a few specific domain, like the expiration date, current registrar, registrant information, etc. once you enter a domain into the search bar at Uniregistry.com/whois, a request is sent to the general public WHOIS database of the domain’s registrar or registry and therefore the stored record is displayed.


nslookup is a simple but very practical command-line tool, which is principally wont to find the IP address that corresponds to a host, or the domain name that corresponds to an IP address (a process called “Reverse DNS Lookup”). nslookup allows itself to be used in the command-line of the OS in question; Windows users start the service via the command prompt, and Unix users via the terminal window.

Sam Spade

Sam Spade runs on all versions of Windows starting with Windows 95 and makes it simple to do a lot of investigation and analysis quickly, from determining the owner of a specific IP address block to examining the contents of an internet page. It also has several features that are specific to the detection of spam and sites that relay spam. sort of a real PI , Sam Spade doesn’t do anything that you couldn’t do yourself if you knew how and had the correct tools; this software integrates the capabilities found in ping, traceroute, time, whois, nslookup, finger, DIG, a packet sniffer, a port scanner, a scripting language, and more, all with a nice GUI to boot.


Download Super Scan from its new location and install it. SuperScan allows you to scan a variety of information processing addresses and do TCP port scanning. It will check all ports, or those you choose. it’s a awfully quick and powerful tool. you’ll be able to see a tutorial here and a youtube video, too.


Download Nmap from its site. you’ll use it in each Windows and UNIX/Linux. It will do ping sweeps, OS identification, additionally to what is finished SuperScan. you’ll be able to see most of its choices and commands at its site choices outline. and a lot of details is seen in its on-line book version. after all you’ll be able to additionally see an youtube video on the nmap basics.


TcpView may be a free tool for Windows that allows you to observe all open TCP and UDP ports on the native laptop. you’ll be able to transfer it from the Microsoft Sysinternals download website. As you’ll be able to see during this image it shows not solely the open ports, however additionally what application in your computer is coupled to the open ports. If a affiliation is established with a foreign host you’ll be able to see the remote host information processing range. TcpView isn’t a Intrusion Detection System, however provides an image of goes on in your laptop relating to to ports and refreshes mechanically, therefore you’ll be able to see the changes that are happening.

My ip Suite

Its combines domain-to-IP device, Batch Ping, Tracers, Whois, Website Scanner And connection Monitor in addition as an IP-to-country device into one Interface.

Dns enumerator

its AN automated sub-domain retrieval tool and it scan google to extract the result

Spider Foot

it will scarpe the the web site on it domain in addition as search Google, Netcraft, Whois and DNS to create up info


Once you discover the list of open ports, future step is begin searching for vulnerability within the servers. one in all the efficient tools to vulnerability scan is Nessus. keep in mind that Nessus is not a free tool.

Related Product : Certified Ethical Hacker | CEH Certification

Zone Transfer 

Searcher for the vulnerabilities in the DNS zone transfer.

Port Scan 

Process a target system or a server for open ports in order to exploit them.

HTTP Header Grabber 

Gathers information about a target system about the type And the version of software it is running.

Honeypot Detector 

Detects the presence of honeypot in a target’s system. A Honeypot contains a data about the system that looks legitimate and is monitored continuously in order to detect any malicious activity which is blocked afterwards.

Questions related to this topic

  1. Can I use 8.8 8.8 DNS?
  2. What port does Google use?
  3. Is port 80 TCP or UDP?
  4. How do I find the URL port number?

Learn CEH & Think like hacker

This Blog Article is posted by

Infosavvy, 2nd Floor, Sai Niketan, Chandavalkar Road Opp. Gora Gandhi Hotel, Above Jumbo King, beside Speakwell Institute, Borivali West, Mumbai, Maharashtra 400092

Contact us – www.info-savvy.com


Leave a Comment