0% found this document useful (0 votes)
176 views

Footprinting & Reconnaissance

This document discusses footprinting and reconnaissance techniques used to gather information about a target network or system without authorization. It defines footprinting as collecting public information about an organization, its networks, systems, employees and technologies. Reconnaissance is collecting targeted information. Passive footprinting uses methods like search engines that do not interact with the target, while active footprinting uses tools like Nmap and Nikto that may be detected. A variety of free online tools and software are listed that can be used for passive and active reconnaissance.

Uploaded by

Souvik Das
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
176 views

Footprinting & Reconnaissance

This document discusses footprinting and reconnaissance techniques used to gather information about a target network or system without authorization. It defines footprinting as collecting public information about an organization, its networks, systems, employees and technologies. Reconnaissance is collecting targeted information. Passive footprinting uses methods like search engines that do not interact with the target, while active footprinting uses tools like Nmap and Nikto that may be detected. A variety of free online tools and software are listed that can be used for passive and active reconnaissance.

Uploaded by

Souvik Das
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Footprinting

&

Reconnaissance
Footprinting &

Reconnaissance
What is Footprinting & Reconnaissance?
Organization Information
Employee details, partner details, weblinks, web

Footprinting refers to collecting as


technologies, patents, trademarks, etc.
much information as possible
Network Information
regarding a target network from
Domains, sub-domains, network blocks, network

publicly accessible sources. topologies, trusted routers, firewalls, IP addresses

of the reachable systems, the Whois record, DNS

records, and other related information


Reconnaissance refers to collecting
System Information
Operating systems, web server OSes, user

information about a target.


accounts and passwords, etc.
Footprinting &

Reconnaissance
Passive Footprinting Active Footprinting

Involves gathering information without


Involves gathering information with direct

direct interaction. This type of footprinting


interaction.
is principally useful when there is a
In active footprinting, the target may

requirement that the information-


recognize the ongoing information

gathering activities are not to be detected


gathering process, as we overtly interact

by the target.Eg Google-


with the target network.Eg

Dorking,Findsubdomains.com,Shodan,Wires
Nmap,Nessus,Nikto,Metasploit etc.
hark etc.
Footprinting &

Reconnaissance
Tools For Reconnaissance
Host Knockpy
Nslookup Niktio Cmsmap
Traceroute Builtwith
Dirbuster
Dnsreacon Dnsdumpster.com
Wfuzz Nessus
wafw00f
Wpscan OpenVas
Dig
Who is Sn1per Showdan
Whatweb Recon-ng Virustotal
TheHarvester Amass
Sublist3r Nmap
Fierce Netcraft
Footprinting &

Reconnaissance
Passive Recon Tools
Showdan - Shodan is
Virustotal-VirusTotal is a
Google Dorking-

a search engine for


website designed to help with
Google can provide a

internet-connected
analysis of potentially
vast amount of

malicious files. Anyone with

devices. As the
information on a

an account on the service

Internet of Things
can upload files or URLs for

variety of different

grows, individuals and


analysis and receive results
topics. One potential

organizations
that describe whether or not
application of Google

increasingly are
the file or website is likely to
is for performing

connecting insecure
be malicious, behavioral
passive

devices to the internet. analysis and other potential


reconnaissance about

indicators of compromise. a target.


Footprinting &

Reconnaissance
Active Recon Tools
Nmap-Nmap is a network
wpscan- Opensource
Nikto-Nikto is a web server

vulnerability scanner that

scanner designed to
tool used to scan

can be used for

determine details about a


vulnerabilities of
reconnaissance in a manner
system and the programs
WordPress websites.
similar to Nessus and

running on it. This is


Click Here for a brief
OpenVAS. It can detect a

variety of different

accomplished through
tutorial on the Security
vulnerabilities but is also not

the use of a suite of


Audit of WordPress
a stealthy scanner.

different scan types that


Applications. Scanning with Nikto can be

effective but is easily

take advantage of the

detectable by an intrusion

details of how a system or


detection or prevention

service operates. system

You might also like