2 Footprinting Contermeasures My resume of module 02 footprinting form CEH material
So far, we have discussed the importance of footprinting, various ways to perform the task, and the tools that help to conduct execution. Now we will discuss footprinting countermeasures, the measures or actions taken to prevent or offset information disclosure.
Some of the footprinting countermeasures are as follows:
Restrict the employees to access social networking sites from organization’s network Configure web servers to avoid information leakage Educate employees to use pseudonyms on blogs, groups, and forums Do not reveal critical information in press releases, annual reports, product catalogues and so on.
1.10 Footprinting through Social Engineering My resume of module 02 footprinting form CEH material
So far, we have discussed the different techniques for gathering information either with the help of online resources or tools. Now we will discuss footprinting through social engineering, the art of obtaining information from people by manipulating them. This section covers the concept as well as the techniques used to gather information.
Social engineering is a totally non-technical process in which an attacker misleds a person into providing confidential information unknowingly.
1.9 Network Footprinting My resume of module 02 footprinting form CEH material
The next step after retrieving the DNS information is gathering network-related information. We will now discuss network footprinting, a method of gathering network-related information. This section describes how to locate network range, determine the OS, Traceroute, and the Traceroute tools.
Locate the Network Range One needs to gather basic and important information about the target organization such as what the organization does, who works there, and what type of work they perform in order to perform a network footprinting.
1.8 Dns Footprinting My resume of module 02 footprinting form CEH material
The next phase in footprinting methodology is DNS footprinting. This following section describes how to extract DNS information and the DNS interrogation tools.
Extracting DNS Information DNS footprinting, namely Domain Name System footprinting, reveals information about DNS zone data. DNS zone data include DNS domain names, computer names, IP addresses, and much more about a particular network. An attacker uses DNS information to determine key hosts in the network, and then performs social engineering attacks to gather even more information.
1.7 Whois Footprinting My resume of module 02 footprinting form CEH material
Whois Footprinting Gathering network-related organization is important information when planning such as a hack. “Whois” information In this section, we about will the target discuss Whois footprinting. Whois footprinting focuses on how to perform a Whois lookup, analyzing the Whois lookup results, and the tools used to gather Whois information.
Whois Lookup Whois is a query and response protocol used for querying databases that store the registered users or assignees of an Internet resource, such as a domain name, an IP address block, or an autonomous system.
1.6 Competitive Intelligence My resume of module 02 footprinting form CEH material
The next phase in footprinting methodology is competitive intelligence. Competitive intelligence is a process that involves the gathering, analyzing, and distribution of information about products, customers, competitors, and technologies using the Internet. The information that is gathered can help managers and executives of a company make strategic decisions.
Competitive Intelligence Gathering Competitive intelligence gathering is the process of identifying, gathering, analyzing, verifying, and using information about your competitors from resources such as the Internet.