Download presentation
Presentation is loading. Please wait.
Published byCory Garrison Modified over 8 years ago
1
WHAT IS FOOTPRINTING?
2
FOOTPRINTING Active Passive - Passive footprinting is a method in which the attacker never makes any contact with the target systems
3
FOOTPRINTING Passive - Passive footprinting is a method in which the attacker never makes any contact with the target systems google search – inurl: intitle: site: filetype: whois queries IP Address (https://www.iplocation.net/) DNS lookup social networking sites
4
FOOTPRINTING ACTIVE FOOTPRINTING MIRRORING WEBSITE Downloads all available contents for offline analysis. Teleport Pro iMiser HTTrack web site coppier EMAIL TRACKING Examine e-mail processing path. email tracker pro MSGTAG PoliteMail zendio
5
FOOTPRINTING Continue……… ACTIVE FOOTPRINTING SERVER VARIFICATION Determines Servers are reachable? Enumerate Network Path From attacker to Target Identifies Connectivity With Target Ping Tracert Visual Traceroute Sam Spade TCR Trace Route
6
FOOTPRINTING Tools We Are Going To Use Google Searching www.hackersforcharity.org & www.exploit-db.comwww.exploit-db.com website.informer.com HTTrack Web Site Coppier email tracker Pro Ping Tracert (http://network-tools.com/) Sam Spade https://www.archive.org
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.