Footprinting: What is it and How Do You Erase Them
Contributed by Eddie Sutton
The systematic and methodical Footprinting of an organization enables attackers to create a complete profile of an organization’s security posture. By using a combination of tools and techniques coupled with a healthy dose of patience, attackers can take an unknown entity (for example XYZ Organization) and reduce it to specific range of domain names, network blocks, and individual IP addresses of systems directly connected to the internet, as well as many other details pertaining to its security posture. Although there are many types of Footprinting techniques, they are primarily aimed at discovering information related to the following environments: Internet, intranet, remote access, and extranet. (the book)
This document is in PDF format. To view it click here.