Footprinting & Scanning
In this section, you will learn about Host and Network Fingerprinting and Scanning. These are essential methods for detecting and identifying endpoints. This is the initial step for penetration testers when they begin assessing a network. By understanding these techniques, you will emulate the tactics and strategies used by adversaries, providing valuable insights into potential vulnerabilities and security gaps.
Purpose:
Scope: Scope refers to the specific range and limits of a project's objectives and deliverables.
Discovery: Discovery refers to the initial phase of network mapping where data and information about the network's infrastructure, devices, and resources are gathered and analyzed.
Process:
Physical Access:
Physical Security
OSINT
Social Engineering
Sniffing:
Passive Reconnaissance
Watch network traffic
ARP - Address Resolution Protocol (RFC 826)
Resolve IP to MAC
ICMP - Internet Control Message Protocol (RFC 792)
Traceroute
Ping
Hacker's Mantra:
A breach alone is not a disaster, but mishandling it is. - Serene Davis
Last updated
Was this helpful?