Footprinting

The systematic footprinting of an organization enables attackers to create a complete profile of an organization’s security posture. By using a combination of tools and techniques, attackers can take an unknown quantity (Widget Company’s Internet connection) and reduce it to a specific range of domain names, network blocks, and individual IP addresses of systems directly connected to the Internet. While there are many types of footprinting techniques, they are primarily aimed at discovering information related to the following environments: Internet, intranet, remote access, and extranet. Table 1-1 depicts these environments and the critical information an attacker will try to identify | CHAPTER 1 3 4 Hacking Exposed Network Security Secrets and Solutions Before the real fun for the hacker begins three essential steps must be performed. This chapter will discuss the first one footprinting the fine art of gathering target information. For example when thieves decide to rob a bank they don t just walk in and start demanding money not the smart ones anyway . Instead they take great pains in gathering information about the bank the armored car routes and delivery times the video cameras and the number of tellers escape exits and anything else that will help in a successful misadventure. The same requirement applies to successful attackers. They must harvest a wealth of information to execute a focused and surgical attack one that won t be readily caught . As a result attackers will gather as much information as possible about all aspects of an organization s security posture. Hackers end up with a unique footprint or profile of their Internet remote access and intranet extranet presence. By following a structured methodology attackers can systematically glean information from a multitude of sources to compile this critical footprint on any organization. WHAT IS FOOTPRINTING The systematic footprinting of an organization enables attackers to create a complete profile of an organization s security posture. By using a combination of tools and techniques attackers can take an unknown quantity Widget Company s Internet connection and reduce it to a specific range of domain names network blocks and individual IP addresses of systems directly connected to the Internet. While there are many types of footprinting techniques they are primarily aimed at discovering information related to the following environments Internet intranet remote access and extranet. Table 1-1 depicts these environments and the critical information an attacker will try to identify. Why Is Footprinting Necessary Footprinting is necessary to systematically and methodically ensure that all

Không thể tạo bản xem trước, hãy bấm tải xuống
TỪ KHÓA LIÊN QUAN
TÀI LIỆU MỚI ĐĂNG
8    74    2    01-07-2024
1    280    4    01-07-2024
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.