What is Footprinting?

What is Footprinting?


Footprinting is basically the first step where hacker gathers as much information as possible to find ways to intrude into a target system or at least decide what type of attacks will be more suitable for the target.

Footprinting is a part of the reconnaissance process which is used for gathering possible information about a target computer system or network. Footprinting could be both passive and active. Reviewing a company’s website is an example of passive footprinting, whereas attempting to gain access to sensitive information through social engineering is an example of active information gathering.

What is Fingerprinting?

Fingerprinting, in ethical hacking, refers to any method that is used to determine the operating system that is being run on the target computer. Fingerprinting, much like Footprinting is both active and passive

Active Fingerprinting

Active fingerprinting is accomplished by sending specially crafted packets to a target machine and then noting down its response and analyzing the gathered information to determine the target OS. In the following section, we have given an example to explain how you can use NMAP tool to detect the OS of a target domain.

Passive Fingerprinting

Passive fingerprinting is based on sniffer traces from the remote system. Based on the sniffer traces (such as Wireshark) of the packets, you can determine the operating system of the remote host. Before attacking a system, it is required that you know what operating system is hosting a website. Once a target OS is known, then it becomes easy to determine which vulnerabilities might be present to exploit the target system. Fingerprinting is done by analyzing various factors of a packet

TTL ? What the operating system sets the Time-To-Live on the outbound packet.

Window Size ? What the operating system sets the Window Size at.

DF ? Does the operating system set the Don’t Fragment bit.

TOS ? Does the operating system set the Type of Service, and if so, at what.

By analyzing these factors of a packet, you may be able to determine the remote operating system. This method is not 100% accurate and works better for some operating systems than others.

要查看或添加评论,请登录

Shivam Singh的更多文章

  • Investor Proposal

    Investor Proposal

    Hello I hope you find this in a healthy state. I am Shivam from AllinOne Cyberteam and we are looking for an investor…

  • Botnet

    Botnet

    A botnet is a logical collection of internet-connected devices such as computers, smartphones or IoT devices whose…

  • Pharming

    Pharming

    Pharming is yet another way hackers attempt to manipulate users on the Internet. While phishing attempts to capture…

  • Spyware

    Spyware

    Spyware is unwanted software that infiltrates your computing device, stealing your internet usage data and sensitive…

  • How To Secure Rooted Android From Security Threats

    How To Secure Rooted Android From Security Threats

    The below tips are helpful and efficient, and you should implement them today to make sure that apps for your rooted…

  • Union Based SQLI

    Union Based SQLI

    Union Based SQLI Requirements :- ? SQL Injection Dorks. ? Vulnerable Website.

  • Google Dork

    Google Dork

    A Google Dork query, sometimes just referred to as a dork, is a search string that uses advanced search operators to…

  • Data Breach

    Data Breach

    A data breach is the intentional or unintentional release of secure or private/confidential information to an untrusted…

  • What is SQL Injection?

    What is SQL Injection?

    SQL injection attack is a code injection technique or method, which is used to attack data driven applications. In this…

  • Phases of Ethical Hacking

    Phases of Ethical Hacking

    Like every discipline out there in the world, ethical hacking is divided into distinct phases. Ethical hacking has 6…

社区洞察

其他会员也浏览了