This preview shows pages 13–17. Sign up to view the full content.
B.Information-Gathering MethodologyInformation gathering can be broken into seven logical steps. Footprinting is performed during the first two steps of unearthing initial information and locating the network range.
has intentionally blurred sections.
Sign up to view the full version.
14 CHAPTER 2: ETHICAL HACKING METHODOLOGY Figure 2.4:Information-Gathering methodology FootprintingFootprinting is defined as the process of creating a blueprint or map of an organization’s network and systems. Information gathering is also known as footprinting an organization. Here are some of the pieces of information to be gathered about a target during footprinting: Domain name Network blocks Network services and applications System architecture Intrusion detection system Authentication mechanisms Specific IP addresses Access control mechanisms Phone numbers Contact addresses Once this information is compiled, it can give a hacker better insight into the organization, where valuable information is stored, and how it can be accessed.