Week 1 Flashcards
(8 cards)
What is Footprinting?
Footprinting is the process of gathering information about a target system or network to identify potential vulnerabilities.
This process typically involves collecting data from various public and private sources.
What techniques can be used for Email Footprinting?
Techniques for Email Footprinting include:
* Email address enumeration
* Header analysis
* MX record lookup
* Social engineering
These techniques help in identifying information about the email accounts and their associated servers.
What is Whois Footprinting?
Whois Footprinting is the technique of querying databases that store registered users or assignees of a domain name or IP address.
It provides details like domain ownership, registration dates, and contact information.
What techniques are used for DNS Footprinting?
Techniques for DNS Footprinting include:
* DNS zone transfer
* DNS record enumeration
* Reverse DNS lookups
* DNS queries
These techniques help gather information about domain names and associated IP addresses.
What is Network Footprinting?
Network Footprinting is the process of identifying the network structure and services of a target system.
This can include mapping the network topology and discovering live hosts.
What are the countermeasures for Footprinting?
Countermeasures for Footprinting include:
* Limiting information disclosure
* Implementing network security measures
* Regularly updating security policies
* Using privacy protection services
These measures help to reduce the amount of information available to potential attackers.
What is the purpose of Footprinting in Ethical Hacking?
The purpose of Footprinting in Ethical Hacking is to gather as much information as possible about a target to identify vulnerabilities before conducting penetration tests.
This helps ethical hackers to simulate attacks and recommend security improvements.
Fill in the blank: Footprinting is the process of _______ about a target system or network.
gathering information
This information helps in identifying potential vulnerabilities.