Steps for Gathering Information
(Footprinting / Fingerprinting)

 

WHY
  1. Attacker
  2. Defender

 

WHAT
  1. System Information
  2. Network Information

 

HOW
TOOLS
  1. Local System Tools
  2. Remote System Tools
RESOURCES
  1. Find out intial information
  2. Find out address range of the network
  3. Find active machines
  4. Find open ports or access points
  5. Figure out the operating system
  6. Figure out which services are running on each port
  7. Map out the network


Please mail any comments about this page to summers_wayne@ColumbusState.edu