Skip to main content

Mapping the Digital Footprint

 

The Ethical Role of Footprinting and Reconnaissance in Security


Hey! How's it going or how's life? Let's focus on the positives and find the solution(s) later on.

Ever heard of reconnaissance? Well, it's a word in a French that translates in English to "recognition". When we find footprints or a clue, eventually we find a lead. Although, a lead to what? It doesn't have to be anything in particular. Sometimes, we will just know and things may be out of emotion or pure faith of the logic. Which, be careful with that! As long as we act on emotions, let's keep boundaries with space even though it may not seem the best sometimes. Since it'd be best to recognize the situation without having to mix anything that may be complicating things more to confusion. And nobody wants to be confused. That's why, when we find a clue, we have the choice to figure out whether if we'd like to know where it is coming from and to what.

Within the personal purpose of Footprinting and Reconnaissance, it comes to recognizing the footprints like a detective would. Only with one clue to identify, that makes you a detective. If that is you, don't reject it, because if you can be able to identify a clue then you're a detective yourself. It just comes to conclude how great of a detective are you. Even from the level of how many clues you can find to creating a lead. Usually by then, we don't know what clues to find until we start generating these ideas to what we find to an amount that eventually points "true". And in the process, worst case scenario is when things aren't actually what they seem to be. It's a job that engage into rebuttals best understood with wisdom.

For example, let's say a cybersecurity professional is hired to test the defenses of a company's network. The first step may be footprinting - gathering publicly available information about the company's online presence. This could involve looking up domain name records, employee names, social media profiles, job postings and more. Each piece forms a clue about the company's digital footprint.

Next comes reconnaissance to probe deeper. The security tester might scan for open ports, try common username/password combinations, check for unpatched services, and so on. This reconnaissance fleshes out the footprint into a map of potential weaknesses.

The goal is to see the system as an attacker would, without actually compromising it. This allows the company to fix any discovered vulnerabilities before they are exploited by real threats. Ethical footprinting and reconnaissance strengthens security through responsible disclosure of risks.

Comments

Popular posts from this blog

How to maintain your senior dog.

 So from what I searched from the internet, Microsoft's Search Engine (SE), Bing, "What dogs require to live a long time" and here's what I got. From PetMD , titled "21 Longest-Living Dog Breeds", says on a list, 1. Chihuahua. Life expectancy: 14-16 years. ..." I'mma stop right there. I have an 11-year-old senior chihuahua. If you want to know more about the list, click the link in the text.  #Bluehyperlink, thanks.  Chleo is the name of my dog. I've been trying to change it to Cleo, short for Cleopatra but no matter the case, it's always going to be Chleo. This is her: I believe she's young, healthy, and I'd like to keep my senior dog young forever! T.T, nothings impossible! Anyways, because she is a chihuahua, one mixed with wiener dog. I don't know if that makes a difference but maybe it does to prevent complications. No boast. She cries when my family and I leave for a vacay, I hear that she cries or even howls. Now, she crie...

Strip down a Website example, a.k.a. Reverse Engineering skill UNLOCKED

 🧠 How a Website Really Works — Broken Down Simply When you open a website like www.example.com , a lot goes on under the hood — but let’s strip it down to the core parts so you see exactly how it runs from top to bottom. 📍 Step 1: You Type a Website into Your Browser When you type a URL (like https://frizasecurity.com ) into your browser and hit Enter, the first thing that happens is: ✅ The browser needs to find the website's IP address. Think of the domain name (like frizasecurity.com ) as a contact name in your phone, and the IP address as the phone number. Your browser asks a DNS server (Domain Name System) to find the number behind that name. You type the name → Browser says: “What’s the IP address for this?” DNS responds: “Here it is: 123.456.789.10 .” 💡 DNS = like the internet’s phone book. 🔄 Step 2: Your Device Talks to the Server Now that your browser knows the IP address, it sends a request to the web server that hosts the site. Think of the...

Stitched 'X'

The doll lay down on the floor with its deep diamond aquatic eyes, placed on a pile of clothes as I folded them while sitting down. Something about it was deep, I thought. Until I heard someone or something step inside the room. Then I heard a mediocrely heavy door shut, thinking that it was on its own at the time without using context. The one who shut the door was a man that I knew who was doing his best to stand tall. In fact, maybe as the tallest in the room. As soon as I tried to greet him back into our home, my heart felt heavy. When I tried to open my mouth, even a peep... I felt something familiar as if my heart was about to ache. I couldn't speak, and my heart had started aching. Afraid, not wanting to tell my partner, I had remembered the promise I made to him. So I told him everything and when I did, my breath was shallow, and my heart was hurting again. Although, he looked down on me from his height when I stood up. He didn't want me to say a word to him like usual....