文档介绍:ColorProLib8 profile:/ Hacking Generic Exposed: CMYK work profile Security Secrets and Solutions, Third Edition / McClure, Scambray & Kurtz / 9381-6 / Chapter 1
Composite Default screen
CHAPTER 1
Footprinting
3
P:\p\Hacking\381-6\
Friday, September 07, 2001 10:37:31 AM
ColorProLib8 profile:/ Hacking Generic Exposed: CMYK work profile Security Secrets and Solutions, Third Edition / McClure, Scambray & Kurtz / 9381-6 / Chapter 1
Composite Default screen
4 Hacking Exposed: Network Security Secrets and Solutions
efore the real fun for the hacker begins, three essential steps must be performed.
This chapter will discuss the first one—footprinting—the fine art of gathering target
Binformation. For example, when thieves decide to rob a bank, they don’t just walk
in and start demanding money (not the smart ones, anyway). Instead, they take great
pains in gathering information about the bank—the armored car routes and delivery
times, the video cameras, and the number of tellers, escape exits, and anything else that
will help in a essful misadventure.
The same requirement applies to essful attackers. They must harvest a wealth of
information to execute a focused and surgical attack (one that won’t be readily caught).
As a result, attackers will gather as much information as possible about all aspects of an
organization’s security posture. Hackers end up with a unique footprint or profile of their
, remote access, and / presence. By following a structured meth-
odology, attackers can systematically glean information from a multitude of sources to
compile this critical footprint on anization.
WHAT IS FOOTPRINTING?
The systematic footprinting of anization enables attackers to create plete pro-
file of anization’s security posture. By using bination of tools and techniques,
attackers can take an unknown quantity (pany’s connection) and re-
duce it to a specific range of domain names, network blocks, and individual IP addr