/images/avatar.webp

Network Footprinting

1.9 Network Footprinting

My resume of module 02 footprinting form CEH material

The next step after retrieving the DNS information is gathering network-related information. We will now discuss network footprinting, a method of gathering network-related information. This section describes how to locate network range, determine the OS, Traceroute, and the Traceroute tools.

Locate the Network Range

One needs to gather basic and important information about the target organization such as what the organization does, who works there, and what type of work they perform in order to perform a network footprinting. The answers to these questions provide information about the internal structure of the target network.

Dns Footprinting

1.8 Dns Footprinting

My resume of module 02 footprinting form CEH material

The next phase in footprinting methodology is DNS footprinting. This following section describes how to extract DNS information and the DNS interrogation tools.

Extracting DNS Information

DNS footprinting, namely Domain Name System footprinting, reveals information about DNS zone data. DNS zone data include DNS domain names, computer names, IP addresses, and much more about a particular network. An attacker uses DNS information to determine key hosts in the network, and then performs social engineering attacks to gather even more information.

Whois Footprinting

1.7 Whois Footprinting

My resume of module 02 footprinting form CEH material

Whois Footprinting Gathering network-related organization is important information when planning such as a hack. “Whois” information In this section, we about will the target discuss Whois footprinting. Whois footprinting focuses on how to perform a Whois lookup, analyzing the Whois lookup results, and the tools used to gather Whois information.

Whois Lookup

Whois is a query and response protocol used for querying databases that store the registered users or assignees of an Internet resource, such as a domain name, an IP address block, or an autonomous system. This protocol listens to requests on port 43 (TCP). Regional Internet Registries (RIRS) maintain Whois databases and it contains the personal information of domain owners. For each resource, Whois database provides text records with information about the resource itself, and relevant information of assignees, registrants, and administrative information (creation and expiration dates).

Competitive Intelligence

1.6 Competitive Intelligence

My resume of module 02 footprinting form CEH material

The next phase in footprinting methodology is competitive intelligence. Competitive intelligence is a process that involves the gathering, analyzing, and distribution of information about products, customers, competitors, and technologies using the Internet. The information that is gathered can help managers and executives of a company make strategic decisions.

Competitive Intelligence Gathering

Competitive intelligence gathering is the process of identifying, gathering, analyzing, verifying, and using information about your competitors from resources such as the Internet. Competitive intelligence means understanding and learning what about other businesses, in order to become as competitive as possible. It is non-interfering and subtle in nature compared to the direct intellectual property theft carried out through hacking or industrial espionage. It concentrates onthe external business environment. In this method, professionals gather information ethically and legally instead of gathering it secretly. Competitive intelligence helps in determining:

Email Footpring

1.5 Email Footprinting

My resume of module 02 footprinting form CEH material

Tracking Email Communications

Email tracking monitors the emails of a particular user. This kind of tracking is possible through digitally time stamped records that reveal the time and date when the target receives and opens a specific email. Email tracking tools allows an attacker to collect information such as IP addresses, mail servers, and service provider involved in sending the mail. Attackers can use this information to build a hacking strategy and to perform social engineering and other attacks. Examples of email tracking tools include eMailTrackerPro, Yesware, ContactMonkey and so on. Information gathered about the victim using email tracking tools:

Website Footprinting

1.4 Website Footprinting

My resume of module 02 footprinting form CEH material

Website footprinting refers to monitoring and analyzing the target organization’s website for information. It is possible for an attacker to build a detailed map of a website’s structure and architecture without triggering the IDS or without raising any system administrator’s suspicions. Attackers use sophisticated footprinting tools or the basic tools that come with the operating system, such as Telnet, or by using a browser.