User:Crawfsh40/sandbox

Hacking Footprinting
Hacking footprinting is the outline draft for all hackers. This is the basic research that has to take place for many successful hacks, including ones that fail. Many people are astonished by end result of the hacker breaking into the company by manipulating the system. Hacking footprinting is what happens behind the scenes. Hacking footprinting is a submissive process that is designed to outline a company’s network systems, for example Internet, Intranet, Extranet, or Wireless. Some of the main areas that are aimed by computer hackers are Domain Name Systems (DNS) and Internet protocols (IP) sequentially to extract addresses.

Hacker’s code of ethics

Hackers believe that it is their moral principle to share their skills and knowledge by writing free software and help to open information and computing resources. Hackers strongly believe that hacking into a system is for fun and for study purposes as long as the hacker doesn’t commit offensive crimes such as theft, vandalism, or breach of confidentiality.

History of Hacking

 * 1972- John Draper (Captain Crunch) used a toy whistle to make a free call


 * 1983- The internet was formed with war games, movies in relation to hacking inspired numerous hackers


 * 1984- Fred Cohen develops the first PC viruses


 * 1989- Kevin Mitnick is convicted for stealing software from Digital Equipment


 * 1994- Russian hackers broke into Citibank and got away with $10 million


 * 1999- David L Smith was arrested for writing the Melissa virus


 * 2000- ILOVEYOU virus spreading worldwide

Types of hackers
White hat hackers are ones that recognizes a security weakness in a network and exposes the weakness to system’s owners so they are able to fix their breaches. They are the good guys of hackers. A black hat hacker identifies the weakness in a network the same way, only to take malicious advantage of it. Black hat hackers would make the exploit known to other hackers and the public without informing the casualty. Grey hat hackers are also considered hybrid hackers. They are a little in between white and black hat hackers. They can either act illegally in good will or evil. They would consider themselves constructive or malicious. Gray is the perfect color for this type of hacker.

Open Source
Open Source Footprinting is the simplest and secure way to find out information about a company. Simply since this information is also made available to the public. Examples of Open Source Footprinting are performing whois requests and scanning certain IP addresses for open ports. Phone number searches and addresses is easy information to get online and legal.

Network Enumerations
Network Enumerations is a method for identifying domain names and associated networks. This procedure involves performing various queries on the numerous whois databases found on the internet. The outcome is the hacker having the information they need to attack the system they are learning about. Companies domain names are listed with registrars. The hack needs to know which registrar the company is listed with in order to obtain the information they are looking for.

Footprinting Steps
Hacking footprinting is assertive manner.

The first step
is getting the proper authorization. This is done before beginning the security assessment.

The second step
is defining the scope of the assessment. The assessment scope determines the organization you’re compromising, certain locations, business partner connections, and the client disaster-recovery sites.

The third
is to find publicly available information. This consists of many different steps like reviewing all files and records within the organization. Scanning the web for detail information, examine Web 2.0 sites, map the physical address, and visit the physical location and think of surveillance techniques.

The forth step
is to perform WHOIS & DNS Enumeration. This is a type of search that permits users to search databases for particular information about users of the internet. This search deals with locations of IP addresses, registered domains, and other network information.

The fifth step
is to try the DNS interrogation. Performing a zone transfer using Windows or Linux allows you to get a list of all the host and IP addresses if successful.

The last step
performed for hacking footprinting is performing a network reconnaissance. This is a term used for testing the likely vulnerabilities in a computer network.

Countermeasures
There are a few countermeasures involved that companies use to protect themselves from hacking footprinting.
 * 1) 	Have boundaries set for the amount of public information accessible about your company or self.
 * 2) 	Defend and protect to remove any internal information from becoming public.
 * 3) 	All remote access information should always stay defended to protect entry points.

Conclusion
Hacking footprinting should be able to find particular information relating to any given company. When all the steps of hacking footprinting are performed successfully you’ll be able to find out all or some of the information you want. Hacking footprinting can used for bad intentions and good. Hacking footprinting could be safe and passive depending on the user. Finding exploits and bugs when your hacking footprint could help protect a companies system once contacted by a system administrator. Footprinting achieves public information, Internet based information, private information, Intranet based information, and public/private remote access.