Ethical Hacking: Reconnaissance/Footprinting

This course starts you at the first phase (out of 5) of hacking. You'll begin the process of probing a system with the intent of attacking and compromising the target. This phase consists of either passively or actively acquiring evidence about a target. The goal is to gather as much data as possible about a would-be target with the goal of getting ample data to make future attacks easier and more directed. This course is part of the Ethical Hacking Series. http://blog.topwallpaper.info/learning-path-ethical-hacking
Course info
Rating
(280)
Level
Beginner
Updated
May 20, 2015
Duration
3h 29m
Table of contents
Description
Course info
Rating
(280)
Level
Beginner
Updated
May 20, 2015
Duration
3h 29m
Description

As an Ethical Hacker, you've been asked to do a "Blackbox" attack on a customer's infrastructure. Your first step is finding out as much as you can about the "target." You accomplish this via reconnaissance/footprinting. This is the initial stage in gaining a blueprint of the security profile of a target, and it is accomplished in an organized manner. Reconnaissance is one of the three "pre-attack phases," and results in a unique profile of an organization's networks and systems. "Reconning" an organization is necessary in order to systematically gather all the related data in regards to the technologies deployed within the network. Reconnaissance can take up to 90% of the time during penetration testing or an actual attack. We'll show you how attackers are currently reconning your company, as well as discuss in detail the steps of reconnaissance. Finally we'll look at some possible countermeasures to help discourage attackers. This course is part of the Ethical Hacking Series. http://blog.topwallpaper.info/learning-path-ethical-hacking

About the author
About the author

Dale Meredith received his Certified Ethical Hacker and Certified EC-Counsel Instructor certifications back in 2006, as well as being a Microsoft Certified Trainer since 1998 (yes we had computers back then). Dale takes great pride in helping students comprehend and simplify complex IT concepts.

More from the author
Secure Software Development
Beginner
3h 15m
12 Sep 2017
More courses by Dale Meredith