may help in guessing the password or in Social Engineering.
2. Network Enumeration- This is
the next step in gaining information where the hacker tries to identify the
domain names and the network blocks of the target network.
3. Scanning- Once the network
block is known, the next step is to spy for active IP addresses on the target
network. The Internet Control Message Protocol (ICMP) is a good alternative for
identifying active IP addresses.
4. Stack Fingerprinting- Once the
hosts and port have been mapped by scanning the target network, the final
footprinting step can be performed. This step is called stack fingerprinting.
This is the process of determining the operating system and different version
of services running on target hosts.
No comments:
Post a Comment