06- Footprinting Flashcards
active fingerprinting
specially crafted packets are sent to the operating system get a response
Application
Is designed for end user operation. It is a program or collection of programs that provides users with access to word processors, Web browsers, picture viewer, etc.
Attack
occurs when a system is compromised based on a vulnerability by an unknown exploit
banner grabbing
can reveal compromising information about the operating system and the services that are running on the system; works by using Telnet or a proprietary program
BiLE
stands for Bi?directional Link Extractor; includes a couple of Perl scripts used in enumeration processes
DNS footprinting
allows you to obtain information about DNS zone data
DNS zone data
includes DNS domain names, computer names, IP addresses, and more information about the network
DNSstuff
DNS interrogation tool; extracts DNS information about IP addresses, mail server extensions, DNS lookups, WHOIS lookups, etc.
Enumeration
the first attack on a target network; the process to gather the information about a target machine by actively connecting to it
Ethical Hacking
testing the resources for a good cause and for the betterment of technology; another term for ?penetration testing.?
Exploit
written to take advantage of a vulnerability; could be a piece of software; a technology; or data that can cause damage or change the behavior of a computer
Firewall
Is a security system consisting of a combination of hardware and software which limits the exposure of a computer or computer network to attack from crackers; commonly used on local area networks that are connected to the Internet. It is a tool that provides security to a network against unauthorized access from the Internet or other outside networks
footprinting
the first step in hacking; the process of collecting information about a target network and its environment
A popular search engine
Google hacking
refers to creating complex search engine queries; An attacker can try to find websites that are vulnerable to exploits and vulnerabilities
Google Hacks
a compilation of carefully crafted Google searches that expose novel functionality from Google’s search and map services
Goolink Scanner
removes the cache from your searches, and collects and displays only vulnerable site’s links
Gooscan
a tool that automates queries against Google search appliances
Hackers for Charity
a group of technologists who have sourced their information from various sources and maintain a GHDB
Hacking
a loaded term that in some ways defies definition. Very simply, it is an intrusion upon a system. In some cases, as with Certified Ethical Hackers, this intrusion is solicited for the purposes of defining and ultimately resolving network vulnerabilities. Still, in others, hacking denotes unauthorized access. In some cases, the term “hacker” is used synonymously with “programmer”