Footprinting


Footprinting is the first step in the hacking process. In this method, hacker tries to gain as much information as possible about target which may lead to compromise the target.


Types of footprinting

1. Open source information gathering.
2. Information gathering with hacking tools.


Google Hacking


It is an open source information gathering technique where hacker try to find important information about targets, like companies subdomains, IP addresses, email ID's, Employee's database, passwords and sites of the company which are vulnerable to hacking attacks through the help of special keywords used in google search engine is known as Google hacking.

List of Google Dorks


1. inurl: login.asp or (php,aspx)





2. filetype: ppt ethical hacking 

  ( instead ppt you can also put doc,xls etc)




3. intitle: ethical hacking



4. inurl: ac.in filetype:xls name






5. inurl: view/index.shtml (unprotected cameras)




and there are lots of keywords like these which you can easily get on google.

Now, we how to extract information.


Identifying registration details of a particular site.

this can be done using websites like "whois.domaintools.com", "who.is" or  "Pipl.com".

while gathering information with these techniques you should also be sure that you should be safe from getting identified.

for that, you can do Spoofing of IP address

There are software's which allows you to spoof your IP address.

List of VPN software's

1. Cyberghost VPN
2. Spotflux VPN
3. Ivacy VPN
4. Security Kiss VPN
5. Strong VPN
6. Hide my ass VPN
7. Hotspot shield VPN


Method to trace IP address using windows


go to command prompt and type this "tracert  www.xyz.com"




now after checking you can get that your data is getting leaked online which will increase the chances of you getting hacked!


so, I will suggest you some methods to make yourself secure and safe from getting hacked.


Footprinting countermeasures

1. Configure routers to restrict the responses of footprinting requests.

2. Configure web server to avoid information leakage and disable unwanted protocols.

3. Use intrusion detection system that can be configured to refuse suspicious traffic and pick up footprinting patterns.

4. Evaluate the information before publishing it on the internet.

5. Perform footprinting attacks and remove any sensitive information found.

6. Use anonymous registration services to avoid information leakage in who is querries.



Next post will be on  " Scanning "

Comments

Popular posts from this blog

Managing Output with Manipulators in C++

What is sniffing?

Creating a bootable USB.