SlideShare a Scribd company logo
By Chetan Thakre
Introduction to foot-printing
Something about me :-
A cybersec enthusiast.
A budding programmer.
A dancer.
And the founder of Neo’s foundation.
Overview :-
What is Foot Printing ?
Objectives of Foot Printing
Different steps of Foot Printing
Foot Printing Methodologies
What is Foot Printing ?
Foot Printing is basically the first step where hacker gathers
as much information as possible to find ways to intrude into a
target system or at least decide what type of attacks will be
more suitable for the target.
Active Foot Printing
Passive Foot Printing
Objectives of Foot Printing :-
Different Steps of Foot Printing :-
EC–Council has divided Foot Printing into seven steps :-
Information Gathering
Determining the Network range.
Identifying active machines.
 Finding open ports and access points.
OS fingerprinting
Fingerprinting services
Mapping the network
Foot Printing Methodologies :-
Extract website information from WaybackMachine.
WhoIs Lookup.
Nmap .
Collecting information From Email Header.
Traceroute.
Foot Printing Through Social Engineering.
Way Back Machine :-
It is very easy to get a complete history of any website using 
www.archive.org
Who Is Lookup :-
Who is database gives a detailed information about a domain
name information including its owner, its registrar, date of
registration, expiry, name server, owner's contact
information, etc.
Nmap :-
Nmap (Network Mapper) is a security scanner, originally
written by Gordon Lyon, used to discover hosts and services
on a computer network, thus building a "map" of the network.
Foot Printing through Social
Engineering :-
Social engineering is an art of exploiting human behavior to
extract confidential information.
Social engineers depend on the fact that people are unaware
of the valuable information and are careless about protecting
it.
Social Engineering Techniques :-
Eavesdropping
Shoulder Surfing
Dumpster Diving
Impersonation on social networking sites
Resources :-
 https://
www.tutorialspoint.com/ethical_hacking/ethical_hacking_footprinting.h
tml
 http://
www.ehacking.net/2011/02/footprinting-first-step-of-ethical.html
 Cybrary.com
 Our Favorite
Thank You!

More Related Content

Introduction to foot printing

  • 1. By Chetan Thakre Introduction to foot-printing
  • 2. Something about me :- A cybersec enthusiast. A budding programmer. A dancer. And the founder of Neo’s foundation.
  • 3. Overview :- What is Foot Printing ? Objectives of Foot Printing Different steps of Foot Printing Foot Printing Methodologies
  • 4. What is Foot Printing ? Foot Printing is basically the first step where hacker gathers as much information as possible to find ways to intrude into a target system or at least decide what type of attacks will be more suitable for the target. Active Foot Printing Passive Foot Printing
  • 5. Objectives of Foot Printing :-
  • 6. Different Steps of Foot Printing :- EC–Council has divided Foot Printing into seven steps :- Information Gathering Determining the Network range. Identifying active machines.  Finding open ports and access points. OS fingerprinting Fingerprinting services Mapping the network
  • 7. Foot Printing Methodologies :- Extract website information from WaybackMachine. WhoIs Lookup. Nmap . Collecting information From Email Header. Traceroute. Foot Printing Through Social Engineering.
  • 8. Way Back Machine :- It is very easy to get a complete history of any website using  www.archive.org
  • 9. Who Is Lookup :- Who is database gives a detailed information about a domain name information including its owner, its registrar, date of registration, expiry, name server, owner's contact information, etc.
  • 10. Nmap :- Nmap (Network Mapper) is a security scanner, originally written by Gordon Lyon, used to discover hosts and services on a computer network, thus building a "map" of the network.
  • 11. Foot Printing through Social Engineering :- Social engineering is an art of exploiting human behavior to extract confidential information. Social engineers depend on the fact that people are unaware of the valuable information and are careless about protecting it.
  • 12. Social Engineering Techniques :- Eavesdropping Shoulder Surfing Dumpster Diving Impersonation on social networking sites
  • 13. Resources :-  https:// www.tutorialspoint.com/ethical_hacking/ethical_hacking_footprinting.h tml  http:// www.ehacking.net/2011/02/footprinting-first-step-of-ethical.html  Cybrary.com  Our Favorite