{"id":37791,"date":"2022-01-19T13:13:40","date_gmt":"2022-01-19T07:43:40","guid":{"rendered":"https:\/\/www.wikitechy.com\/technology\/?p=37791"},"modified":"2022-01-19T14:59:07","modified_gmt":"2022-01-19T09:29:07","slug":"footprinting-in-ethical-hacking","status":"publish","type":"post","link":"https:\/\/www.wikitechy.com\/technology\/footprinting-in-ethical-hacking\/","title":{"rendered":"Footprinting in Ethical Hacking"},"content":{"rendered":"<h2 id=\"what-is-footprinting\" style=\"text-align: justify;\">What is Footprinting ?<\/h2>\n<p style=\"text-align: justify;\">Footprinting is a part of the Inspection phase of <a href=\"https:\/\/www.wikitechy.com\/technology\/15-best-websites-learn-ethical-hacking-home\/\">Ethical Hacking<\/a> in which you gather information about the system\/ application. The main goal of Footprinting is to gather as much information as possible about the system\/ application to narrow down the areas and techniques of attack. Footprinting is a very important part of Ethical Hacking.<\/p>\n<p style=\"text-align: justify;\">Visualize you are a famous <a href=\"https:\/\/www.wikitechy.com\/technology\/10-simple-steps-become-good-ethical-hacker\/\">Ethical Hacker<\/a> and you get a job to check a Web Application for vulnerabilities. You get the name of the association whose website you have to test. How would you start testing the website for vulnerabilities? You would start by gathering information about that website.<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"size-full wp-image-37792\" src=\"https:\/\/www.wikitechy.com\/technology\/wp-content\/uploads\/2022\/01\/footprinting-in-ethical-hacking.png\" alt=\"\" width=\"1690\" height=\"811\" srcset=\"https:\/\/www.wikitechy.com\/technology\/wp-content\/uploads\/2022\/01\/footprinting-in-ethical-hacking.png 1690w, https:\/\/www.wikitechy.com\/technology\/wp-content\/uploads\/2022\/01\/footprinting-in-ethical-hacking-300x144.png 300w, https:\/\/www.wikitechy.com\/technology\/wp-content\/uploads\/2022\/01\/footprinting-in-ethical-hacking-1024x491.png 1024w, https:\/\/www.wikitechy.com\/technology\/wp-content\/uploads\/2022\/01\/footprinting-in-ethical-hacking-768x369.png 768w, https:\/\/www.wikitechy.com\/technology\/wp-content\/uploads\/2022\/01\/footprinting-in-ethical-hacking-1536x737.png 1536w, https:\/\/www.wikitechy.com\/technology\/wp-content\/uploads\/2022\/01\/footprinting-in-ethical-hacking-990x475.png 990w, https:\/\/www.wikitechy.com\/technology\/wp-content\/uploads\/2022\/01\/footprinting-in-ethical-hacking-1320x633.png 1320w\" sizes=\"(max-width: 1690px) 100vw, 1690px\" \/><\/p>\n<h2 id=\"why-is-footprinting-important\" style=\"text-align: justify;\"><strong>Why is Footprinting Important ?<\/strong><\/h2>\n<p style=\"text-align: justify;\">Footprinting is one of the important phases of Ethical Hacking. For ex, Movie Plot. Assume you are looking a Bank robbery movie, there are people who have planned to rob a bank. Movies like Ocean\u2019s Eleven, The Italian Job, or Fast and Furious, do the characters directly buy guns and masks and enter the bank to rob it? No! If they did this, they wouldn\u2019t be able to rob the bank successfully.<\/p>\n<p style=\"text-align: justify;\">So, what do they do before robbing the bank? They make a good plan on how to enter the bank, how to handle the security, and make an escape plan. And to plan the robbery, they need to see certain things about the bank, the way it activates, how the security works, etc. Knowing about the bank plays an important role in making the plan.<\/p>\n<p style=\"text-align: justify;\">In the same way, knowing about the system\/ application is very important for ethical hacking because it will let you know what type of vulnerabilities can be found and what attacks are suitable.<\/p>\n<p><img decoding=\"async\" class=\"size-full wp-image-37793\" src=\"https:\/\/www.wikitechy.com\/technology\/wp-content\/uploads\/2022\/01\/phases-of-attack.png\" alt=\"\" width=\"960\" height=\"720\" srcset=\"https:\/\/www.wikitechy.com\/technology\/wp-content\/uploads\/2022\/01\/phases-of-attack.png 960w, https:\/\/www.wikitechy.com\/technology\/wp-content\/uploads\/2022\/01\/phases-of-attack-300x225.png 300w, https:\/\/www.wikitechy.com\/technology\/wp-content\/uploads\/2022\/01\/phases-of-attack-768x576.png 768w, https:\/\/www.wikitechy.com\/technology\/wp-content\/uploads\/2022\/01\/phases-of-attack-74x55.png 74w, https:\/\/www.wikitechy.com\/technology\/wp-content\/uploads\/2022\/01\/phases-of-attack-111x83.png 111w, https:\/\/www.wikitechy.com\/technology\/wp-content\/uploads\/2022\/01\/phases-of-attack-215x161.png 215w\" sizes=\"(max-width: 960px) 100vw, 960px\" \/><\/p>\n<h2 id=\"types-of-footprinting\" style=\"text-align: justify;\">Types of Footprinting<\/h2>\n<p style=\"text-align: justify;\">It can be divided into two types:<\/p>\n<ul style=\"text-align: justify;\">\n<li>Active Footprinting<\/li>\n<li>Passive Footprinting<\/li>\n<\/ul>\n<h2 id=\"active-footprinting\" style=\"text-align: justify;\"><strong>Active Footprinting<\/strong><\/h2>\n<ul style=\"text-align: justify;\">\n<li>It is the type of Footprinting where you gather information about the system\/ application by directly relating with the system. When you use Active Foot printing, there is a high chance that some data like your IP address is saved by the system you are trying to gather the information about.<\/li>\n<\/ul>\n<h2 id=\"passive-footprinting\" style=\"text-align: justify;\"><strong>Passive Footprinting<\/strong><\/h2>\n<ul style=\"text-align: justify;\">\n<li>Here you gather information without relating with the system\/ application you are trying to know about. You gather information via search engines or public records. When you use Passive Footprinting, there is no way that the system would save your IP address.<\/li>\n<\/ul>\n<h3 id=\"footprinting-helps-to\"><strong>Footprinting helps to<\/strong><\/h3>\n<p><strong>Know Security Posture<\/strong> \u2013 The data gathered will help us to get an outline of the security posture of the company such as details about the presence of a firewall, security configurations of applications etc.<\/p>\n<p><strong>Reduce Attack Area<\/strong> \u2013 Can identify a specific range of systems and focus on particular targets only. This will greatly decrease the number of systems we are focussing on.<\/p>\n<p><strong>Identify vulnerabilities<\/strong> \u2013 We can build an information database holding the vulnerabilities, threats, loopholes available in the system of the target organization.<\/p>\n<p><strong>Draw Network map<\/strong> \u2013 Helps to draw a network map of the networks in the target organization covering topology, trusted routers, presence of server and other information.<\/p>\n<h2 id=\"how-to-gather-information-in-footprinting\"><strong>How to Gather Information in Footprinting ?<\/strong><\/h2>\n<p>Here I will show you some methods to gather information.<\/p>\n<p>Now we will try to gather information about <strong>Wikitechy Website<\/strong> . Suppose you don\u2019t know anything about Wikitechy site, how would you start gathering information? The first step is to use a search engine.<\/p>\n<h2 id=\"footprinting-using-search-engine\"><strong>Footprinting using Search Engine<\/strong><\/h2>\n<p>Open a browser and search for <strong>\u201cWikitechy\u201d<\/strong><\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-37796 aligncenter\" src=\"https:\/\/www.wikitechy.com\/technology\/wp-content\/uploads\/2022\/01\/wikitechy.png\" alt=\"\" width=\"1334\" height=\"1050\" srcset=\"https:\/\/www.wikitechy.com\/technology\/wp-content\/uploads\/2022\/01\/wikitechy.png 1334w, https:\/\/www.wikitechy.com\/technology\/wp-content\/uploads\/2022\/01\/wikitechy-300x236.png 300w, https:\/\/www.wikitechy.com\/technology\/wp-content\/uploads\/2022\/01\/wikitechy-1024x806.png 1024w, https:\/\/www.wikitechy.com\/technology\/wp-content\/uploads\/2022\/01\/wikitechy-768x604.png 768w, https:\/\/www.wikitechy.com\/technology\/wp-content\/uploads\/2022\/01\/wikitechy-990x779.png 990w, https:\/\/www.wikitechy.com\/technology\/wp-content\/uploads\/2022\/01\/wikitechy-1320x1039.png 1320w\" sizes=\"(max-width: 1334px) 100vw, 1334px\" \/><\/p>\n<p>You will find the URL of Wikitechy i.e., www.wikitechy.com. This is the first piece of information you have found.<\/p>\n<p>Using the URL of the website, you can find the IP address of the website by pinging to it.<\/p>\n<h2 id=\"ping-to-find-the-ip-address\"><strong>Ping to find the IP address<\/strong><\/h2>\n<p>To find the IP address of Wikitechy website, open the terminal and run the below command:<\/p>\n<p><strong>ping www.wikitechy.com<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-37797 aligncenter\" src=\"https:\/\/www.wikitechy.com\/technology\/wp-content\/uploads\/2022\/01\/ping-command.png\" alt=\"\" width=\"1740\" height=\"867\" srcset=\"https:\/\/www.wikitechy.com\/technology\/wp-content\/uploads\/2022\/01\/ping-command.png 1740w, https:\/\/www.wikitechy.com\/technology\/wp-content\/uploads\/2022\/01\/ping-command-300x149.png 300w, https:\/\/www.wikitechy.com\/technology\/wp-content\/uploads\/2022\/01\/ping-command-1024x510.png 1024w, https:\/\/www.wikitechy.com\/technology\/wp-content\/uploads\/2022\/01\/ping-command-768x383.png 768w, https:\/\/www.wikitechy.com\/technology\/wp-content\/uploads\/2022\/01\/ping-command-1536x765.png 1536w, https:\/\/www.wikitechy.com\/technology\/wp-content\/uploads\/2022\/01\/ping-command-990x493.png 990w, https:\/\/www.wikitechy.com\/technology\/wp-content\/uploads\/2022\/01\/ping-command-1320x658.png 1320w\" sizes=\"(max-width: 1740px) 100vw, 1740px\" \/><\/p>\n<p>You can see that we found the IP address of Wikitechy. The IP address is <strong>260:4700:8d7f:92bd:15de:fe:2d9a:2448<\/strong><\/p>\n<p>The IP address is just a small part of information about the website. To get more information, we will use Whois Lookup.<\/p>\n<h2 id=\"whois-lookup\">Whois Lookup<\/h2>\n<p>It is a tool used to find out information such as <strong>DNS, domain names, name servers, IP addresses<\/strong>, etc. To find some more information about the Wikitechy website, open a browser and go to <a href=\"http:\/\/whois.domaintools.com\/\" target=\"_blank\" rel=\"noopener\">http:\/\/whois.domaintools.com\/<\/a><\/p>\n<p>Enter the website name (or IP address) and click \u201cSearch\u201c<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-37798\" src=\"https:\/\/www.wikitechy.com\/technology\/wp-content\/uploads\/2022\/01\/whois-lookup.png\" alt=\"\" width=\"1397\" height=\"553\" srcset=\"https:\/\/www.wikitechy.com\/technology\/wp-content\/uploads\/2022\/01\/whois-lookup.png 1397w, https:\/\/www.wikitechy.com\/technology\/wp-content\/uploads\/2022\/01\/whois-lookup-300x119.png 300w, https:\/\/www.wikitechy.com\/technology\/wp-content\/uploads\/2022\/01\/whois-lookup-1024x405.png 1024w, https:\/\/www.wikitechy.com\/technology\/wp-content\/uploads\/2022\/01\/whois-lookup-768x304.png 768w, https:\/\/www.wikitechy.com\/technology\/wp-content\/uploads\/2022\/01\/whois-lookup-990x392.png 990w, https:\/\/www.wikitechy.com\/technology\/wp-content\/uploads\/2022\/01\/whois-lookup-1320x523.png 1320w\" sizes=\"(max-width: 1397px) 100vw, 1397px\" \/><\/p>\n<p>This search will display several information about the website.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-37799\" src=\"https:\/\/www.wikitechy.com\/technology\/wp-content\/uploads\/2022\/01\/website-information.png\" alt=\"\" width=\"1358\" height=\"766\" srcset=\"https:\/\/www.wikitechy.com\/technology\/wp-content\/uploads\/2022\/01\/website-information.png 1358w, https:\/\/www.wikitechy.com\/technology\/wp-content\/uploads\/2022\/01\/website-information-300x168.png 300w, https:\/\/www.wikitechy.com\/technology\/wp-content\/uploads\/2022\/01\/website-information-1024x578.png 1024w, https:\/\/www.wikitechy.com\/technology\/wp-content\/uploads\/2022\/01\/website-information-768x433.png 768w, https:\/\/www.wikitechy.com\/technology\/wp-content\/uploads\/2022\/01\/website-information-470x264.png 470w, https:\/\/www.wikitechy.com\/technology\/wp-content\/uploads\/2022\/01\/website-information-640x360.png 640w, https:\/\/www.wikitechy.com\/technology\/wp-content\/uploads\/2022\/01\/website-information-215x120.png 215w, https:\/\/www.wikitechy.com\/technology\/wp-content\/uploads\/2022\/01\/website-information-990x558.png 990w, https:\/\/www.wikitechy.com\/technology\/wp-content\/uploads\/2022\/01\/website-information-1320x745.png 1320w\" sizes=\"(max-width: 1358px) 100vw, 1358px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">\n","protected":false},"excerpt":{"rendered":"<p>What is Footprinting ? Footprinting is a part of the Inspection phase of Ethical Hacking in which you gather information about the system\/ application. The main goal of Footprinting is to gather as much information as possible about the system\/ application to narrow down the areas and techniques of attack. Footprinting is a very important [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29859],"tags":[27486,100992,100999,101005,101000,101002,100993,101004,100998,101006,100995,100994,101008,101001,101007,101003,100996,100991,100997],"class_list":["post-37791","post","type-post","status-publish","format-standard","hentry","category-hacking","tag-ethical-hacking","tag-footprinting","tag-footprinting-and-reconnaissance","tag-footprinting-and-reconnaissance-in-ethical-hacking","tag-footprinting-in-cyber-security","tag-footprinting-in-ethical-hacking","tag-footprinting-tools-and-techniques","tag-footprinting-tools-in-ethical-hacking","tag-footprinting-vs-reconnaissance","tag-how-many-types-of-ethical-hacking","tag-objectives-of-footprinting","tag-scanning-in-ethical-hacking","tag-tools-used-in-footprinting","tag-types-of-footprinting","tag-types-of-footprinting-in-cyber-security","tag-types-of-footprinting-in-ethical-hacking","tag-what-is-footprinting","tag-what-is-footprinting-in-ethical-hacking","tag-who-is-footprinting"],"_links":{"self":[{"href":"https:\/\/www.wikitechy.com\/technology\/wp-json\/wp\/v2\/posts\/37791","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wikitechy.com\/technology\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wikitechy.com\/technology\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wikitechy.com\/technology\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wikitechy.com\/technology\/wp-json\/wp\/v2\/comments?post=37791"}],"version-history":[{"count":4,"href":"https:\/\/www.wikitechy.com\/technology\/wp-json\/wp\/v2\/posts\/37791\/revisions"}],"predecessor-version":[{"id":37801,"href":"https:\/\/www.wikitechy.com\/technology\/wp-json\/wp\/v2\/posts\/37791\/revisions\/37801"}],"wp:attachment":[{"href":"https:\/\/www.wikitechy.com\/technology\/wp-json\/wp\/v2\/media?parent=37791"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wikitechy.com\/technology\/wp-json\/wp\/v2\/categories?post=37791"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wikitechy.com\/technology\/wp-json\/wp\/v2\/tags?post=37791"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}