Hacking Exposed: Network Security Secrets and Solutions
Before the real fun for the hacker begins, three essential steps must be performed.
This chapter will discuss the first one—footprinting —the fine art of gathering target
information. For example, when thieves decide to rob a bank, they don’t just walk
in and start demanding money (not the smart ones, anyway). Instead, they take great
pains in gathering information about the bank—the armored car routes and delivery
times, the video cameras, and the number of tellers, escape exits, and anything else that
will help in a successful misadventure.
The same requirement applies to successful attackers. They must harvest a wealth of
information to execute a focused and surgical attack (one that won’t be readily caught).
As a result, attackers will gather as much information as possible about all aspects of an
organization’s security posture. Hackers end up with a uniquefootprint or profile of their
Internet, remote access, and intranet/extranet presence. By following a structured meth -
odology, attackers can systematically glean information from a multitude of sources to
compile this critical footprint on any organization.
Download
0 comments:
Post a Comment