Information Technology Reference
In-Depth Information
Another search that can be done is “inurl: robots.txt” (again without quotes). This would
look for a page called robots.txt. I his file (robots.txt) us used to display all the directories
and pages that a website wishes to keep anonymous from the search engine spiders. Thus,
luckily you might come across some valuable information that was meant to be kept private
in this file.
HOW TO USE FOOTPRINTING
Footprinting is a first step that a penetration tester used to evaluate the security of any IT
infrastructure, footprinting means to gather the maximum information about the computer
system or a network and about the devices that are attached to this network. Footprinting is
a first and the important step because after this a penetration tester knows how the hacker
sees this network.
To measure the security of a computer system, it is good to know more and more as you
can because after this you will able to determine the path that a hacker will use to exploit
this network.
This is the basic block diagram which shows the steps that are include in the penetration
testing methodology, in this article we will discuss the first one that is foot printing. The
hacking course divides footprinting and scanning into seven basic steps. These include;
1. Information gathering
2. Determining the network range
3. Identifying active machines
4. Finding open ports and access points
5. OS fingerprinting
6. Fingerprinting services
7. Mapping the network
Information of an organization means to find these:
Internet: Domain name, network blocks, IP addresses open to Net, TCP and UDP services
running, ACLs, IDSes
Intranet : Protocols (IP, NETBIOS), internal domain names, etc. Remote Access: Phone
numbers, remote control, telnet, authentication Extranet : Connection origination, destina-
tion, type, access control.
Search WWH ::




Custom Search