|This article does not cite any references or sources. (December 2009)|
Footprinting is the technique of gathering information about computer systems and the entities they belong to. This is done by employing various computer security techniques, as:--
- DNS queries
- Network enumeration
- Network queries
- Operating system identification
- Organizational queries
- Ping sweeps
- Point of contact queries
- Port Scanning
- Registrar queries (WHOIS queries)
- SNMP queries
- World Wide Web spidering
INTRODUCTION ( BY Harsh Bothra )
Footprinting is when information about a particular computer, and its related users and systems, is gathered together. To get this information, a hacker might use various tools and technologies. This information is very useful to a hacker that is trying to crack a whole system – not just an email account or a bank account. By finding out everything a system does and has on it, the hacker can become an extremely powerful attacker. USES OF FOOTPRINTING
It allows a hacker to get complete access to all your information. A hacker would start with basic information from your website – such as names, email addresses and so on. Next, they can find out the IP address of your website and can check if your server is online – a site like PING will give this information from your web address. A quick Google search will also reveal more information about your site, such as when your domain was registered and when it will expire, networking protocols and more.
In the process of crawling we have to surf on the internet to get the required information about the target. We have Surf on Target’s Website, blog, social site in order to get somewhat information and in this method the information that we will got will be helpful in other methods too.
WHOIS is A web application used to getting information about the target website and we will get information like admin email etc.
WHOIS is a very large database and contains information of approximately all the websites. we can search for the domain name and if it is registered in its database than we will get required information. We can get details about the technical staff who are managing their websites and domain names along with details about registration
We can use the following website for whois :
Google can be also used to gather information about the target system. It depends upon the user how one use google as information collector. If used properly hacker can gather a lots of information using google about a company, its career and its policies etc.
We can gather information by using Trace Route. Tracert is a command which is used for doing trace route. We can use it to see where our request is being forwarded and through which devices. Tracert is basically a commond which can be used to trace a path between a user and the target system on the networks.
In Linux system tracepath and traceroute commands are also available for doing traceroute operations.
SNS stands for SOCIAL NETWORKING SITES . we can also use SNS for footprinting. One is to compile a list od employees working un the target organization and to look for their details which can again give us information about the type and number of staffs, systems and security measures which are installed. Websites such as Linkedin, Twitter etc. can be used to gather more information about the target. On the basis of the information gathered social networking can also be performed.
When used in the computer security lexicon, "footprinting" generally refers to one of the pre-attack phases; tasks performed prior to doing the actual attack. Some of the tools used for footprinting are Sam Spade, nslookup, traceroute, Nmap and neotrace.