From the course: Certified Ethical Hacker (CEH)

Unlock this course with a free trial

Join today to access over 25,300 courses taught by industry experts.

Executing network footprinting

Executing network footprinting

- [Instructor] Let's go over executing network footprinting. And whenever you're executing network footprinting, this involves a series of steps to gather information about the target network. And this information can be used for identifying any potential entry points and vulnerabilities that you may have within the network. Right, now one of the main things is that you have to clearly define what you want to achieve with this network footprint capability, if you will, such as identifying whether it's open services or open POS network, topologies, vulnerabilities, et cetera. Now, in the passive reconnaissance, so only doing passive reconnaissance, you can actually collect basic information about the target network using DNS using very network, common network tools like Trace out for example. And what you're seeing in front of you, of course, is the dig utility from Linux and I did, a dig against secretcorp.org, which is one of the fictitious domains that we have in here. Well, it's a…

Contents