Chapter Opener Photo

© -strizh-/Shutterstock, Inc.

CHAPTER
5

Footprinting Tools and Techniques

HACKING INTO SYSTEMS is far more than simply using a few software tools to gain access to the target. Although it is true that there are a multitude of tools available to hackers to make things easier, effective hacking is a process that takes place in phases. Each phase in the hacking process serves to uncover increasingly useful information about a target that can be used in the eventual break-in.

The first phase of most cyberattacks is the footprinting phase, which is specifically designed to passively gain information about a target. If done correctly and patiently, it is sometimes possible for skilled attackers to gain valuable information about their intended target without alerting the victim to the impending attack. It’s surprising what information is obtainable during this phase: network topology, equipment/technologies in use, financial information, physical locations, physical assets, and personnel names and titles. A typical organization generates a wealth of information as a byproduct of its operations, and such information can be used for any purpose that an attacker may have in mind.

In this chapter, we will introduce the process that hackers use along with the techniques that are used during each step of the process. An understanding of the techniques that hackers use will provide valuable insight into not just the mechanics of the process but also how to thwart them in the real world. In this chapter, special emphasis will be placed on the first of the cyberattack phases: footprinting.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.134.87.95