31-05-2012, 01:31 PM
Hands-On Ethical Hacking and Network Defense
Hands-On Ethical Hacking and Network Defense.ppt (Size: 1.96 MB / Downloads: 61)
Footprinting and Social Engineering
Using Web Tools for Footprinting
“Case the joint”
Look over the location
Find weakness in security systems
Types of locks, alarms
In computer jargon, this is called footprinting
Discover information about
The organization
Its network
Conducting Competitive Intelligence
Numerous resources to find information legally
Competitive Intelligence
Gathering information using technology
Identify methods others can use to find information about your organization
Limit amount of information company makes public
Using Other Footprinting Tools
Whois
Commonly used tool
Gathers IP address and domain information
Attackers can also use it
Host command
Can look up one IP address, or the whole DNS Zone file
All the servers in the domain
Using E-mail Addresses
E-mail addresses help you retrieve even more information than the previous commands
Find e-mail address format
Guess other employees’ e-mail accounts
Tool to find corporate employee information
Groups.google.com