Ethical Hacking Footprinting and Reconnaissance
Hacking computer networks and systems does not start with a click of a mouse in an application to gain access to a target. Although this can occur, it tends to be more opportunistic and not part of a well-thought-out plan. Each phase of the journey uncovers useful information that the attacker can use to not only break in but to stay hidden. But to get there, they need information.
This is where the first phase of most attacks begins, with information gathering and intelligence, often called footprinting. In this stage, we passively gain information about a target. What that means is we gather information without the knowledge of the target. This is done primarily through what is called Open Source Intelligence (OSINT) starting with the simplest of tools, Google. If done correctly, not only will general information be gained about the target but it can overturn potential vulnerabilities and weaknesses. Reconnaissance can be employed...