CLICK HERE TO DOWNLOAD PPT ON Scanning and Footprinting
Scanning and Footprinting Presentation Transcript
1.Scanning and Footprinting
2.Footprinting
3.Footprinting Methodology
Internet Footprinting
Finding a company’s Url
Locate internal Urls
Search for Company’s Information from newspaper, jobs website like naukri.com
Through Search Engine(Google ,Yahoo ,Bing )
People search on Social Networking Service
Gathering Information from Financial Services
Internet Footprinting
Finding a company’s Url
Locate internal Urls
Search for Company’s Information from newspaper, jobs website like naukri.com
Through Search Engine(Google ,Yahoo ,Bing )
People search on Social Networking Service
Gathering Information from Financial Services
4.Tools used for Footprinting
5.Addition Tools for Footprinting
Yahoo People Search
Sam Spade
Visual Trace Route
www.netcraft.com
www.archive.org
NetMask
NetInspector
Yahoo People Search
Sam Spade
Visual Trace Route
www.netcraft.com
www.archive.org
NetMask
NetInspector
6.Scanning
Scanning refers to a set of procedures for identifying hosts, ports and services in a network
Types of Scanning:-
A series of messages sent by someone attempting to break into a computer to learn about
the computer’s network services.
The automated process of proactively identifying vulnerabilities of the computing systems
present in a network.
A procedure for identifying the active hosts on a network.
Scanning refers to a set of procedures for identifying hosts, ports and services in a network
Types of Scanning:-
A series of messages sent by someone attempting to break into a computer to learn about
the computer’s network services.
The automated process of proactively identifying vulnerabilities of the computing systems
present in a network.
A procedure for identifying the active hosts on a network.
7.Tool used for Scanning
8.Do not Scan these ip address
9.Steps of Website Scanning
10.Steps of Website Scanning
11.Clearing Google cookie logs
12.Addition tools for Scanning
LANState
Netmapper
Retina
Network Security Inspector
Nessus
Network miner
Super Scan
Nscan
Advanced Port Scanner
LANState
Netmapper
Retina
Network Security Inspector
Nessus
Network miner
Super Scan
Nscan
Advanced Port Scanner
13.Summary
Scanning is one of the three components of intelligence gathering for an attacker .
The objective of scanning is to discover live systems, active/running ports and the service
running on the network.
Footprinting refers to uncovering and collecting as much information as possible about a
target of attack .
WHOIS databases are maintained by regional internet registries and contains the personal
information of domain owner.
Personal information can be found using online people search services.
Scanning is one of the three components of intelligence gathering for an attacker .
The objective of scanning is to discover live systems, active/running ports and the service
running on the network.
Footprinting refers to uncovering and collecting as much information as possible about a
target of attack .
WHOIS databases are maintained by regional internet registries and contains the personal
information of domain owner.
Personal information can be found using online people search services.
0 comments