Footprinting - FOOTPRINTING SCENARIO Mr.!Thenotebook .com hadrequested Whencontacted, gaveacoldresponse. mind.

Info iconThis preview shows pages 1–7. Sign up to view the full content.

View Full Document Right Arrow Icon
FOOTPRINTING
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
SCENARIO Mr. Xyz is fuming with anger! The notebook  which he had ordered online from abc.com  company did not have the configuration that he  had requested. When contacted, the customer care department  gave a cold response. Vengeance crept into his  mind. Finally he decided to teach the notebook  manufacturer a lesson. Being a network administrator of his firm, he  knew exactly what he has supposed to do
Background image of page 2
What will Mason do to defame the notebook  manufacturer? What information will Mason need to achieve his goal? “If you’re a good hacker, every one  knows your name. If you’re a  great hacker, no one knows who  you are”
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
NOTE The purpose of the scenario description is  not to advocate a single means of  information gathering, but  rather to give  the prespective of a cracker. Not all  crackers behave in a similar manner. The  hacker’s community takes pride in its  ingenuity to finding ways of accessing a  system, a concept not necessarily  understood previously.
Background image of page 4
OBJECTIVE Overview of the Reconnaissance Phase  (Preparatory phase) Footprinting : An introduction Information Methodology of Hackers Competitive intelligence gathering Tool that Aid in Footprinting. Footprinting steps Note that there is no “one way” for hackers to approach a system. It is  not possible to have foreknowledge for the intent behind their  activities, nor their skill level, so all the activity must be treated as a 
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Note that the focus of this course is not to teach  the finer aspects of hacking, but rather to 
Background image of page 6
Image of page 7
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 03/26/2010 for the course SECB 408 taught by Professor Wassimelhaj during the Spring '07 term at United Arab Emirates University.

Page1 / 21

Footprinting - FOOTPRINTING SCENARIO Mr.!Thenotebook .com hadrequested Whencontacted, gaveacoldresponse. mind.

This preview shows document pages 1 - 7. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online