IT
ethicalhacking-130625095228-phpapp01.pdf

B information gathering methodology information

Info icon This preview shows pages 13–17. Sign up to view the full content.

B. Information-Gathering Methodology Information gathering can be broken into seven logical steps. Footprinting is performed during the first two steps of unearthing initial information and locating the network range.
Image of page 13

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

14 CHAPTER 2: ETHICAL HACKING METHODOLOGY Figure 2.4: Information-Gathering methodology Footprinting Footprinting is defined as the process of creating a blueprint or map of an organization’s network and systems. Information gathering is also known as footprinting an organization. Here are some of the pieces of information to be gathered about a target during footprinting: Domain name Network blocks Network services and applications System architecture Intrusion detection system Authentication mechanisms Specific IP addresses Access control mechanisms Phone numbers Contact addresses Once this information is compiled, it can give a hacker better insight into the organization, where valuable information is stored, and how it can be accessed.
Image of page 14