Browse Wiki & Semantic Web

Jump to: navigation, search
Http://dbpedia.org/resource/Footprinting
  This page has no properties.
hide properties that link here 
  No properties link to this page.
 
http://dbpedia.org/resource/Footprinting
http://dbpedia.org/ontology/abstract Footprinting, em português pegada, também Footprinting, em português pegada, também conhecida como reconhecimento, é a técnica usada para coletar informações sobre os sistemas de computadores e as entidades às quais eles pertencem. Para obter essa informação, um hacker pode usar várias ferramentas e tecnologias. Esta informação é muito útil para um hacker que está tentando quebrar um sistema inteiro. Quando usado no léxico de segurança do computador, o termo "Footprinting" geralmente se refere a uma das fases de pré-ataque, que são tarefas executadas antes de se fazer o ataque real. Algumas das ferramentas usadas para o Footprinting são , nslookup, traceroute, Nmap e .nting são , nslookup, traceroute, Nmap e . , Footprinting (also known as reconnaissanceFootprinting (also known as reconnaissance) is the technique used for gathering information about computer systems and the entities they belong to. To get this information, a hacker might use various tools and technologies. This information is very useful to a hacker who is trying to crack a whole system. When used in the computer security lexicon, "Footprinting" generally refers to one of the pre-attack phases; tasks performed before doing the actual attack. Some of the tools used for Footprinting are Sam Spade, nslookup, traceroute, Nmap and neotrace., nslookup, traceroute, Nmap and neotrace. , Le Footprinting est la technique consistanLe Footprinting est la technique consistant à récolter de l'information sur des systèmes informatiques et toutes les entités auxquelles ils sont rattachés. Cela est effectué par le biais de plusieurs techniques : * Requêtes DNS ; * Énumération réseau ; * Requêtes réseau ; * Identification du Système d'exploitation ; * Requêtes sur l'organisation ; * Balayage Ping ; * Requêtes sur les points de contacts ; * Scan de port ; * Requêtes auprès des registrars (requêtes WHOIS) ; * Requêtes SNMP ; * Navigation du World Wide Web. Dans le jargon de la sécurité informatique, le footprinting se réfère généralement aux étapes précédant une attaque. Quelques utilitaires utilisés pour faire du footprinting : , nslookup, traceroute, Nmap et neotrace. , nslookup, traceroute, Nmap et neotrace. , 풋프린팅(Footprinting)은 컴퓨터 시스템들과 그것들이 속한 엔티티들풋프린팅(Footprinting)은 컴퓨터 시스템들과 그것들이 속한 엔티티들에 대한 정보를 모으는 기법이다. 이것은 다양한 컴퓨터 보안 기법들을 이용한다. * DNS 쿼리 * * 네트워크 쿼리 * 운영 체제 식별 * 조직적인 쿼리 * 핑 스위프 * 컨택트 쿼리의 포인트 * 포트 스캔 * 등록된 쿼리 (WHOIS 쿼리) * SNMP 쿼리 * 월드 와이드 웹 스파이더링 컴퓨터 보안 어휘로 사용될 때 "풋프린팅"은 일반적으로 공격 전 국면의 하나를 가리킨다. 즉, 실제 공격 이전에 수행된다. 풋프린팅을 위해 사용되는 툴들 중 몇몇으로 Sam Spade, nslookup, traceroute, Nmap 그리고 neotrace가 있다.lookup, traceroute, Nmap 그리고 neotrace가 있다. , جمع المعلومات (بالإنجليزية: Footprinting) جمع المعلومات (بالإنجليزية: Footprinting) هي تقنية تستخدم لجمع المعلومات عن أنظمة الحاسوب. للحصول على تلك المعلومات قد يستعمل المتسلل أدوات وتقنيات عديدة. تلك المعلومات تكون مفيدة جداً بالنسبة للمتسلل الذي يحاول اختراق النظام. بعض الأدوات التي تستعمل في جمع المعلومات هي: إن إس لوك أب، تريسروت، إن ماب وغيرها...ي: إن إس لوك أب، تريسروت، إن ماب وغيرها... , 腳印拓取,或译为足跡蒐集(Footprinting),俗称“踩点”。是黑客入侵预定目标如服务器检测目标有何漏洞搜集有用信息资讯再最终制定入侵方案的方法之一,另一种一般为扫描。 , Footprinting ist ein Begriff aus der IT-SiFootprinting ist ein Begriff aus der IT-Sicherheit. Er bezeichnet die erste Phase eines Hackingangriffs, und zwar die Informationsbeschaffung über ein Zielsystem. Man unterscheidet zwischen aktivem und passivem Footprinting. Beim passiven Footprinting werden öffentlich zugängliche Daten über ein Angriffsziel zusammengetragen. Diese Informationsgewinnung geschieht unter anderem über folgende Quellen: * Homepage des Opfers * Suchmaschinen * Stellenausschreibungen in Unternehmen * Newsgroups Informationsquellen für das aktive Footprinting sind dabei unter anderem: * Fingerprinting * Die WHOIS-Datenbank * Der DNS-Eintrag * Pingsweep * Traceroute * Portscans Über die WHOIS-Datenbank erfährt man vom Rechnungskontakt der Domain die E-Mail-Adresse, Telefonnummer und die Postadresse, zusätzlich die IP-Adresse des primären und sekundären DNS-Servers. Über eine DNS-Anfrage kann die IP des Webservers und des Mailservers ermittelt werden und alle anderen über das Internet zugänglichen Dienste. Über die Unternehmenswebpage können Informationen über das Unternehmen und seine Angestellten gewonnen werden z. B. Namen, Fotos die fürs Social Engineering von entscheidender Bedeutung sind. Im Rahmen der Sicherheitskonferenz Chaos Communication Congress wurde eine neue Methode vorgestellt, um Ergebnisse von Suchmaschinenabfragen sowie WHOIS-Datenbanken zu korrelieren und effizient alle Webanwendungen zu identifizieren, die einer Firma logisch zugeordnet sind., die einer Firma logisch zugeordnet sind.
http://dbpedia.org/ontology/wikiPageID 2031371
http://dbpedia.org/ontology/wikiPageLength 6688
http://dbpedia.org/ontology/wikiPageRevisionID 1107520743
http://dbpedia.org/ontology/wikiPageWikiLink http://dbpedia.org/resource/Traceroute + , http://dbpedia.org/resource/Nslookup + , http://dbpedia.org/resource/Category:Computing_terminology + , http://dbpedia.org/resource/Wireshark + , http://dbpedia.org/resource/Network_enumerating + , http://dbpedia.org/resource/Nmap + , http://dbpedia.org/resource/Operating_system + , http://dbpedia.org/resource/Network_Security + , http://dbpedia.org/resource/WHOIS + , http://dbpedia.org/resource/Google + , http://dbpedia.org/resource/Ping_sweep + , http://dbpedia.org/resource/Domain_name_services + , http://dbpedia.org/resource/Category:Computer_security + , http://dbpedia.org/resource/Sam_Spade_%28software%29 + , http://dbpedia.org/resource/Linux + , http://dbpedia.org/resource/Intrusion_Detection_System + , http://dbpedia.org/resource/Digital_footprint +
http://dbpedia.org/property/wikiPageUsesTemplate http://dbpedia.org/resource/Template:Refimprove + , http://dbpedia.org/resource/Template:See_also + , http://dbpedia.org/resource/Template:Reflist + , http://dbpedia.org/resource/Template:For +
http://purl.org/dc/terms/subject http://dbpedia.org/resource/Category:Computer_security + , http://dbpedia.org/resource/Category:Computing_terminology +
http://purl.org/linguistics/gold/hypernym http://dbpedia.org/resource/Technique +
http://www.w3.org/ns/prov#wasDerivedFrom http://en.wikipedia.org/wiki/Footprinting?oldid=1107520743&ns=0 +
http://xmlns.com/foaf/0.1/isPrimaryTopicOf http://en.wikipedia.org/wiki/Footprinting +
owl:sameAs http://ar.dbpedia.org/resource/%D8%AC%D9%85%D8%B9_%D8%A7%D9%84%D9%85%D8%B9%D9%84%D9%88%D9%85%D8%A7%D8%AA_%28%D8%A3%D9%85%D9%86_%D8%A7%D9%84%D8%AD%D8%A7%D8%B3%D9%88%D8%A8%29 + , http://rdf.freebase.com/ns/m.06gf6l + , https://global.dbpedia.org/id/4pw7x + , http://ko.dbpedia.org/resource/%ED%92%8B%ED%94%84%EB%A6%B0%ED%8C%85 + , http://dbpedia.org/resource/Footprinting + , http://de.dbpedia.org/resource/Footprinting + , http://pt.dbpedia.org/resource/Footprinting + , http://fa.dbpedia.org/resource/%D8%B1%D9%88%D8%B4_%D8%B1%D8%AF%D9%BE%D8%A7 + , http://zh.dbpedia.org/resource/%E8%85%B3%E5%8D%B0%E6%8B%93%E5%8F%96 + , http://www.wikidata.org/entity/Q648006 + , http://fr.dbpedia.org/resource/Footprinting +
rdf:type http://dbpedia.org/ontology/TopicalConcept +
rdfs:comment Footprinting (also known as reconnaissanceFootprinting (also known as reconnaissance) is the technique used for gathering information about computer systems and the entities they belong to. To get this information, a hacker might use various tools and technologies. This information is very useful to a hacker who is trying to crack a whole system. When used in the computer security lexicon, "Footprinting" generally refers to one of the pre-attack phases; tasks performed before doing the actual attack. Some of the tools used for Footprinting are Sam Spade, nslookup, traceroute, Nmap and neotrace., nslookup, traceroute, Nmap and neotrace. , Footprinting ist ein Begriff aus der IT-SiFootprinting ist ein Begriff aus der IT-Sicherheit. Er bezeichnet die erste Phase eines Hackingangriffs, und zwar die Informationsbeschaffung über ein Zielsystem. Man unterscheidet zwischen aktivem und passivem Footprinting. Beim passiven Footprinting werden öffentlich zugängliche Daten über ein Angriffsziel zusammengetragen. Diese Informationsgewinnung geschieht unter anderem über folgende Quellen: * Homepage des Opfers * Suchmaschinen * Stellenausschreibungen in Unternehmen * Newsgroups Informationsquellen für das aktive Footprinting sind dabei unter anderem:ive Footprinting sind dabei unter anderem: , جمع المعلومات (بالإنجليزية: Footprinting) جمع المعلومات (بالإنجليزية: Footprinting) هي تقنية تستخدم لجمع المعلومات عن أنظمة الحاسوب. للحصول على تلك المعلومات قد يستعمل المتسلل أدوات وتقنيات عديدة. تلك المعلومات تكون مفيدة جداً بالنسبة للمتسلل الذي يحاول اختراق النظام. بعض الأدوات التي تستعمل في جمع المعلومات هي: إن إس لوك أب، تريسروت، إن ماب وغيرها...ي: إن إس لوك أب، تريسروت، إن ماب وغيرها... , 풋프린팅(Footprinting)은 컴퓨터 시스템들과 그것들이 속한 엔티티들풋프린팅(Footprinting)은 컴퓨터 시스템들과 그것들이 속한 엔티티들에 대한 정보를 모으는 기법이다. 이것은 다양한 컴퓨터 보안 기법들을 이용한다. * DNS 쿼리 * * 네트워크 쿼리 * 운영 체제 식별 * 조직적인 쿼리 * 핑 스위프 * 컨택트 쿼리의 포인트 * 포트 스캔 * 등록된 쿼리 (WHOIS 쿼리) * SNMP 쿼리 * 월드 와이드 웹 스파이더링 컴퓨터 보안 어휘로 사용될 때 "풋프린팅"은 일반적으로 공격 전 국면의 하나를 가리킨다. 즉, 실제 공격 이전에 수행된다. 풋프린팅을 위해 사용되는 툴들 중 몇몇으로 Sam Spade, nslookup, traceroute, Nmap 그리고 neotrace가 있다.lookup, traceroute, Nmap 그리고 neotrace가 있다. , Footprinting, em português pegada, também Footprinting, em português pegada, também conhecida como reconhecimento, é a técnica usada para coletar informações sobre os sistemas de computadores e as entidades às quais eles pertencem. Para obter essa informação, um hacker pode usar várias ferramentas e tecnologias. Esta informação é muito útil para um hacker que está tentando quebrar um sistema inteiro. está tentando quebrar um sistema inteiro. , Le Footprinting est la technique consistanLe Footprinting est la technique consistant à récolter de l'information sur des systèmes informatiques et toutes les entités auxquelles ils sont rattachés. Cela est effectué par le biais de plusieurs techniques : * Requêtes DNS ; * Énumération réseau ; * Requêtes réseau ; * Identification du Système d'exploitation ; * Requêtes sur l'organisation ; * Balayage Ping ; * Requêtes sur les points de contacts ; * Scan de port ; * Requêtes auprès des registrars (requêtes WHOIS) ; * Requêtes SNMP ; * Navigation du World Wide Web.es SNMP ; * Navigation du World Wide Web. , 腳印拓取,或译为足跡蒐集(Footprinting),俗称“踩点”。是黑客入侵预定目标如服务器检测目标有何漏洞搜集有用信息资讯再最终制定入侵方案的方法之一,另一种一般为扫描。
rdfs:label 풋프린팅 , Footprinting , 腳印拓取 , جمع المعلومات (أمن الحاسوب)
rdfs:seeAlso http://dbpedia.org/resource/Footprint_%28disambiguation%29 +
hide properties that link here 
http://dbpedia.org/resource/Footprint_%28disambiguation%29 + http://dbpedia.org/ontology/wikiPageDisambiguates
http://dbpedia.org/resource/Footprint_%28disambiguation%29 + , http://dbpedia.org/resource/Havex + , http://dbpedia.org/resource/Index_of_molecular_biology_articles + , http://dbpedia.org/resource/Phylogenetic_footprinting + , http://dbpedia.org/resource/Index_of_genetics_articles + http://dbpedia.org/ontology/wikiPageWikiLink
http://en.wikipedia.org/wiki/Footprinting + http://xmlns.com/foaf/0.1/primaryTopic
http://dbpedia.org/resource/Footprinting + owl:sameAs
 

 

Enter the name of the page to start semantic browsing from.