Footprinting - Attack Methods | Learn Cyber Security

Subscribe & Don,t Miss A Free Cyber Security Course| Receive Daily Updates

Enter your email address:

Footprinting - Attack Methods

Attack Methods

The attacker may choose to source the information from:

* A web page (save it offline, e.g. using offline browser such as Teleport pro

* Yahoo or other directories. (Tifny is a comprehensive search tool for USENET newsgroups.

* Multiple search engines (All-in-One, Dogpile), is a great resource for searching large numbers of news group archives without having to use a tool.

* Using advanced search (e.g. AltaVista),

* Search on publicly trade companies (e.g. EDGAR).

* Dumpster diving (To retrieve documents that have been carelessly disposed)

* Physical access (False ID, temporary/contract employees, unauthorized access etc)

There are four RIRs, each maintaining a whois database holding details of IP address registrations in their regions. The RIR whois databases are located at:
ARIN (North America and sub-Saharan Africa)
APNIC (Asia Pacific region)
LACNIC (Southern and Central America and Caribbean)
RIPE NCC (Europe and northern Africa)
There are tools available to aid a whois lookup. Some of them are Sam Spade (downloadable from Smart Whois (downloadable from Netscan (downloadable from and GTWhois (Windows XP compatible) ( etc.

Share your views...

0 Respones to "Footprinting - Attack Methods"

Post a Comment


© 2011 Learn Cyber Security All Rights Reserved Learn Hacking Online