02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Terminology in Footprinting 87<br />

Organization Data<br />

Not all information is technical, so look for information about how an organization works.<br />

Information that provides details about employees, operations, projects, or other details is<br />

vital. This includes:<br />

■ Employee details<br />

■ Organization’s website<br />

■ Company directory<br />

■ Location details<br />

■ Address and phone numbers<br />

■ Comments in HTML source code<br />

■ Security policies implemented<br />

■ Web server links relevant to the organization<br />

■ Background of the organization<br />

■ News articles and press releases<br />

Terminology in Footprinting<br />

In this section you’ll learn definitions that may appear on the <strong>CEH</strong> exam.<br />

Open Source and Passive Information Gathering<br />

As far as intelligence gathering goes, open source or passive information gathering is the<br />

least aggressive. Basically the process relies on obtaining information from those sources<br />

that are typically publicly available and out in the open. Potential sources include newspapers,<br />

websites, discussion groups, press releases, television, social networking, blogs, and<br />

innumerable other sources.<br />

With a skilled and careful hand, it is more than possible to gather operating system and<br />

network information, public IP addresses, web server information, and TCP and UDP data<br />

sources, just to name a few.<br />

Active Information Gathering<br />

Active information gathering involves engagement with the target through techniques<br />

such as social engineering. Attackers tend to focus their efforts on the “soft target,”<br />

which tends to be human beings. A savvy attacker engages employees under different<br />

guises under various pretenses with the goal of socially engineering an individual to<br />

reveal information.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!