SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsThere are three essential steps that a hacker, have to perform to get a good picture of an organization's layout. The steps are Foot printing, scanning and Enumeration. Foot printing is the ability to obtain essential information about an organization. This information includes the technologies that are being used such as, Internet, Intranet, Remote Access and the Extranet. In addition, to the technologies the security policies and procedures must be explored. By pursuing a structured procedure, attackers can systematically put together information from a collection of sources to compile a critical footprint of any organization. By using a combination of tools and techniques an hacker can take an unknown quality and reduce it to a specific range of domain names, network blocks and individual IP addresses of a system that is directly connected to the Internet. The foot printing process must be performed accurately and in a controlled environment. This paper outlines the steps that a hacker must follow to make a foot print of an organization.