Difference between revisions of "Footprinting"
(Created page with "Refers to the process of collecting as much information as possible about the target system to find ways to penetrate into the system. An Ethical hacker has to spend the major...") |
|||
(One intermediate revision by the same user not shown) | |||
Line 8: | Line 8: | ||
'''Draw Network map''' – helps to draw a network map of the networks in the target organization covering topology, trusted routers, presence of server and other information. | '''Draw Network map''' – helps to draw a network map of the networks in the target organization covering topology, trusted routers, presence of server and other information. | ||
+ | |||
+ | |||
+ | ==See also== | ||
+ | |||
+ | *[[Security]] | ||
+ | *[[CEH Contents]] | ||
+ | |||
+ | [[Category:IT Security]] |
Latest revision as of 09:58, 24 February 2020
Refers to the process of collecting as much information as possible about the target system to find ways to penetrate into the system. An Ethical hacker has to spend the majority of his time in profiling an organization, recollect information about the host, network and people related to the organization.
Know Security Posture – The data gathered will help us to get an overview of the security posture of the company such as details about the presence of a firewall, security configurations of applications, etc.
Reduce Attack Area – Can identify a specific range of systems and concentrate on particular targets only. This will greatly reduce the number of systems we are focussing on.
Identify vulnerabilities – we can build an information database containing the vulnerabilities, threats, loopholes available in the system of the target organization.
Draw Network map – helps to draw a network map of the networks in the target organization covering topology, trusted routers, presence of server and other information.
See also[edit]
Advertising: