Footprinting or Reconnaissance
Gathering information about computer systems and the entities they belong to is called Footprinting. When used in the computer security lexicon, “Footprinting” generally refers to one of the pre-attack phases; tasks performed prior to doing the actual attack. Some of the tools used for Footprinting are Sam Spade, nslookup, traceroute, Nmap and neotrace.
To get this information, a hacker might use various tools and technologies. This information is very useful to a hacker who is trying to crack a whole system.
Footprinting is basically the first step where hacker gathers as much information as possible to find ways to intrude into a target system or at least decide what type of attacks will be more suitable for the target.
During this phase, a hacker can collect the following information −
- Domain name
- IP Addresses
- Namespaces
- Employee information
- Phone numbers
- E-mails
- Job Information
By Using some kind of tools we can fins the whole information about any network. We can also find the database name and also those shared servers who runs multiple website on a single machine. We can find all those websites who is running from a single server machine.
Footprinting In Hacking Is The First Step Towards Hacking.