It is the process of collecting information about
the target before gaining access and uncovering it. Different techniques of
footprinting are –
- Open Source Footprinting – It is a way to find administrator contact information. This
information is later used to guess the correct password.
- Network Enumeration – Here the hacker tries to identify domain names and network
blocks of the target.
- Scanning –
Scanning includes prying on the active IP addresses of a network.
- Stack Fingerprinting – : This is the last footprinting step, which involves
mapping the port and host.
No comments:
Post a Comment