Footprinting are often done using hacking tools, either applications or websites, which allow the hacker to locate information passively. By using these footprinting tools, a hacker can gain some basic information on, or “footprint,” the target. By first footprinting the target, a hacker can eliminate tools which will not work against the target systems or network. as an example, if a graphics design firm uses all Macintosh computers, then all hacking software that targets Windows systems are often eliminated. Footprinting not only speeds up the hacking process by eliminating certain toolsets but also minimizes the prospect of detection as fewer hacking attempts are often made by using the correct tool for the job.
For the exercises, you’ll perform reconnaissance and information gathering on a target company. i recommend you use your own organization, but because these tools are passive, any organization name are often used.
Some of the common tools used for footprinting and information gathering are as follows:
- Sam Spade
- My ip Suite
- Dns enumerator
- Spider Foot
- Zone Transfer
- Port Scan
- HTTP Header Grabber
- Honeypot Detector
Different types of Foot printing tools:
A WHOIS lookup could be a way for you to search the general public database for information a few specific domain, like the expiration date, current registrar, registrant information, etc. once you enter a domain into the search bar at Uniregistry.com/whois, a request is sent to the general public WHOIS database of the domain’s registrar or registry and therefore the stored record is displayed.
nslookup is a simple but very practical command-line tool, which is principally wont to find the IP address that corresponds to a host, or the domain name that corresponds to an IP address (a process called “Reverse DNS Lookup”). nslookup allows itself to be used in the command-line of the OS in question; Windows users start the service via the command prompt, and Unix users via the terminal window.
Sam Spade runs on all versions of Windows starting with Windows 95 and makes it simple to do a lot of investigation and analysis quickly, from determining the owner of a specific IP address block to examining the contents of an internet page. Additionally, it contains a number of capabilities tailored specifically to the identification of spam and spam-relaying websites. Sam Spade, a sort of real PI, doesn’t do anything that you couldn’t do yourself if you knew how and had the right tools; this software combines the features of ping, traceroute, time, whois, nslookup, finger, DIG, a packet sniffer, a port scanner, a scripting language, and more with a nice GUI on top of it.
Download Super Scan from its new location and install it. SuperScan allows you to scan a variety of information processing addresses and do TCP port scanning. It will check all ports, or those you choose. it’s a awfully quick and powerful tool. you’ll be able to see a tutorial here and a youtube video, too.
Download Nmap from its site. you’ll use it in each Windows and UNIX/Linux. It will do ping sweeps, OS identification, additionally to what is finished SuperScan. you’ll be able to see most of its choices and commands at its site choices outline. and a lot of details is seen in its on-line book version. after all you’ll be able to additionally see an youtube video on the nmap basics.
TcpView may be a free tool for Windows that allows you to observe all open TCP and UDP ports on the native laptop. you’ll be able to transfer it from the Microsoft Sysinternals download website. As you’ll be able to see during this image it shows not solely the open ports, however additionally what application in your computer is coupled to the open ports. If a affiliation is established with a foreign host you’ll be able to see the remote host information processing range. TcpView isn’t a Intrusion Detection System, however provides an image of goes on in your laptop relating to to ports and refreshes mechanically, therefore you’ll be able to see the changes that are happening.
My ip Suite
Its combines domain-to-IP device, Batch Ping, Tracers, Whois, Website Scanner And connection Monitor in addition as an IP-to-country device into one Interface.
its AN automated sub-domain retrieval tool and it scan google to extract the result
it will scarpe the the web site on it domain in addition as search Google, Netcraft, Whois and DNS to create up info
Once you discover the list of open ports, future step is begin searching for vulnerability within the servers. one in all the efficient tools to vulnerability scan is Nessus. keep in mind that Nessus is not a free tool.
Searcher for the vulnerabilities in the DNS zone transfer.
Process a target system or a server for open ports in order to exploit them.
HTTP Header Grabber
Gathers information about a target system about the type And the version of software it is running.
Detects the presence of honeypot in a target’s system. A Honeypot contains a data about the system that looks legitimate and is monitored continuously in order to detect any malicious activity which is blocked afterwards.