{"id":33949,"date":"2021-05-19T09:47:44","date_gmt":"2021-05-19T07:47:44","guid":{"rendered":"https:\/\/eiposgrados.com\/?p=33949"},"modified":"2021-05-19T10:16:05","modified_gmt":"2021-05-19T08:16:05","slug":"what-is-footprinting","status":"publish","type":"post","link":"https:\/\/eiposgrados.com\/eng\/blog-ciberseguridad\/que-es-footprinting\/","title":{"rendered":"What is Footprinting?"},"content":{"rendered":"<p>We call <strong>Footprinting<\/strong> (also known as recognition), to one of the<strong> phases prior to the cyber attack<\/strong>, is the process of collecting as much information as possible about what we want to \u201chack\u201d to locate vulnerabilities and ways to access it. To obtain this information the <strong>\u201chacker\u201d<\/strong> You can use various tools and processes.<\/p>\n\n\n\n<p>If you want to learn about the phases of ethical hacking and become one of the best, we highly recommend our <a href=\"https:\/\/eiposgrados.com\/eng\/master-in-cybersecurity\/\" class=\"rank-math-link\">Master in Cybersecurity Management, Ethical Hacking and Offensive Security<\/a>, focused on employability and stand out from the rest in<a href=\"https:\/\/eiposgrados.com\/eng\/\" class=\"rank-math-link\"> EIP.<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Information collected by the \u201chacker\u201d<\/h2>\n\n\n\n<p>Footprinting is basically a previous step to the cyber attack where the<strong> \u201chacker\u201d<\/strong> Gather all the information you can about your <strong>victim<\/strong> to find ways to access the system or decide what <strong>cyber attacks<\/strong> They would be the most successful against their target.<\/p>\n\n\n\n<p>Normally the<strong> information <\/strong>What they usually collect is:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Domain name<\/li><li>IP addresses<\/li><li>Operating system used<\/li><li>Employee information<\/li><li>Telephone numbers<\/li><li>Email addresses<\/li><li>Etc.<\/li><\/ul>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/05\/que-es-footprinting-tipos-y-procesos-1024x576.jpg\" alt=\"what is footprinting\" class=\"wp-image-33956\" width=\"666\" height=\"374\" title=\"\" srcset=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/05\/que-es-footprinting-tipos-y-procesos-1024x576.jpg 1024w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/05\/que-es-footprinting-tipos-y-procesos-300x169.jpg 300w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/05\/que-es-footprinting-tipos-y-procesos-768x432.jpg 768w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/05\/que-es-footprinting-tipos-y-procesos-1536x864.jpg 1536w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/05\/que-es-footprinting-tipos-y-procesos-2048x1152.jpg 2048w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/05\/que-es-footprinting-tipos-y-procesos-293x165.jpg 293w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/05\/que-es-footprinting-tipos-y-procesos-scaled.jpg 1920w\" sizes=\"(max-width: 666px) 100vw, 666px\" \/><\/figure><\/div>\n\n\n\n<p>A <strong>ethical hacker <\/strong>You usually spend most of your time protecting a network or organization, collecting information about the host, the network, the computers, and the people related to the system, through the security phase. <strong>Footprinting<\/strong> It will help you identify vulnerabilities that we detect during reconnaissance and strengthen our system against possible threats.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Types of Footprinting<\/h2>\n\n\n\n<p>There are two types of Footprinting that we can use:<strong> Active and passive footprinting<\/strong>:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Active Footprinting<\/strong>, is the most tedious process to obtain information, where we will use tools and techniques to do so. For example, we can perform a sweep of <em>ping<\/em> to collect information about the target or use the command <em>traceroute<\/em>.<\/li><li><strong>Passive Footprinting<\/strong>In this lighter process, for example, we review a company&#039;s website, visit employee profiles on social networks, search on Google for the target to be hacked, or search for the website in WHOIS.<\/li><\/ul>\n\n\n\n<p>Obtaining information from a website is very easy, you just have to access the<strong> address<\/strong>: https:\/\/www.dondominio.com\/whois\/ and search for the page we want.<\/p>\n\n\n\n<p>Let&#039;s do an example of <strong>WHOIS to the Amazon website<\/strong>.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/05\/Que\u0301-es-Footprinting-1024x859.png\" alt=\"\" class=\"wp-image-33950\" width=\"794\" height=\"666\" title=\"\" srcset=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/05\/Que\u0301-es-Footprinting-1024x859.png 1024w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/05\/Que\u0301-es-Footprinting-300x252.png 300w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/05\/Que\u0301-es-Footprinting-768x644.png 768w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/05\/Que\u0301-es-Footprinting-197x165.png 197w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/05\/Que\u0301-es-Footprinting.png 1063w\" sizes=\"(max-width: 794px) 100vw, 794px\" \/><\/figure><\/div>\n\n\n\n<p>As we can see in the result it gives us all the<strong> domain information<\/strong>, he<strong> administrative contact<\/strong>, he <strong>technician and servers.<\/strong><\/p>","protected":false},"excerpt":{"rendered":"<p>From EIP we tell you what Footprinting is and everything you should take into account if you suffer this cyber attack. Do not miss it! <\/p>","protected":false},"author":51,"featured_media":33960,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[332],"tags":[],"class_list":["post-33949","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-ciberseguridad"],"acf":[],"_links":{"self":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts\/33949","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/users\/51"}],"replies":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/comments?post=33949"}],"version-history":[{"count":0,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts\/33949\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/media\/33960"}],"wp:attachment":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/media?parent=33949"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/categories?post=33949"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/tags?post=33949"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}