CHAPTER 2. Reconnaissance: Information Gathering for the Ethical Hacker / 2

Google Hacking A useful tactic in footprinting a target was popularized mainly in late 2004 by a guy named Johnny Long, who was part of an IT security team at his job. While performing pen tests and ethical hacking, he started paying attention to how the search strings worked in Google. The search engine has … Continue reading CHAPTER 2. Reconnaissance: Information Gathering for the Ethical Hacker / 2

CHAPTER 2. Reconnaissance: Information Gathering for the Ethical Hacker

In this chapter you will • Define active and passive footprinting• Identify methods and procedures in information gathering• Understand the use of social networking, search engines, and Google hacking in information gathering• Understand the use of whois, ARIN, and nslookup in information gathering• Describe the DNS record types Footprinting Gathering information about your intended target … Continue reading CHAPTER 2. Reconnaissance: Information Gathering for the Ethical Hacker