Cybersecurity Certification Course (31 Blogs) Become a Certified Professional
AWS Global Infrastructure

Cyber Security

Topics Covered
  • Cybersecurity Certification Course (31 Blogs)

Footprinting- The Understructure of Ethical Hacking

Last updated on Jul 14,2022 6.1K Views

Omkar S Hiremath
Tech Enthusiast in Blockchain, Hadoop, Python, Cyber-Security, Ethical Hacking. Interested in anything... Tech Enthusiast in Blockchain, Hadoop, Python, Cyber-Security, Ethical Hacking. Interested in anything and everything about Computers.
3 / 4 Blog from Ethical Hacking Basics

This blog will be about how to start with Ethical Hacking. I will be discussing the phase of Footprinting, and some ways to gather information about the application you want to test for Vulnerabilities. For learning the other phases in detail, check out Edureka’s CyberSecurity training.

The topics covered in this blog are:

What is Footprinting?

Imagine you are a well known Ethical Hacker and you get a job to check a Web Application for vulnerabilities. You get the name of the organization whose website you have to test. How would you start testing the website for vulnerabilities? You would start by gathering information about that website. This is what Footprinting is.

Footprinting is a part of the Reconnaissance phase of Ethical Hacking in which you gather information about the system/ application. The main aim of Footprinting is to gather as much information as possible about the system/ application to narrow down the areas and techniques of attack.

Most of the people find Footprinting boring, but it is a very important part of Ethical Hacking. And the next section will tell you why. 

Why is Footprinting Important?

Footprinting is considered one of the most important phases of Ethical Hacking. Let’s take a movie plot for example. Suppose you are watching a Bank robbery movie, there are people who have planned to rob a bank. Movies like Ocean’s Eleven, The Italian Job or Fast and Furious, do the characters directly buy guns and masks and enter the bank to rob it? No! If they did this, they wouldn’t be able to rob the bank successfully.

So what do they do before robbing the bank? They make a proper plan on how to enter the bank, how to handle the security, and prepare an escape plan. And to plan the robbery, they need to observe certain things about the bank, the way it operates, how the security works, etc. Knowing about the bank plays an important role in making the plan.

Similarly, knowing about the system/ application is very important for ethical hacking because it will let you know what type of vulnerabilities can be found and what attacks are suitable.

Now that you’ve got an idea of what Footprinting is and why it is important. If you are excited to know about the footprinting in Ethical hacking, join the Ethical Hacking Course Online today.

It’s time to understand a little about the different types of Footprinting.

Types of Footprinting

Similar to Reconnaissance, Footprinting can be divided into two types:

  1. Active Footprinting
  2. Passive Footprinting

Active Footprinting

Active Footprinting is the type of Footprinting where you gather information about the system/ application by directly interacting with the system. When you use Active Footprinting, there is a high chance that some information like your IP address is saved by the system you are trying to gather the information about.

Passive Footprinting

In the case of Passive Footprinting, you gather information without interacting with the system/ application you are trying to know about. You gather information through search engines or public records. When you use Passive Footprinting, there is no way that the system would save your IP address.

Now that you have understood the basics of Footprinting, without further delay, let’s get to the hands-on part of Footprinting

How to Gather Information in Footprinting?

In this section, I will show you some methods to gather information. I will be using Kali Linux Operating System for this. If you don’t have Kali Linux, you can visit this link to learn how to install Kali Linux.

In this blog, we will try to gather information about Edureka Community. Suppose you don’t know anything about Edureka Community, how would you start gathering information? The first step is to use a search engine.

Footprinting using Search Engine

Open a browser and search for “Edureka Community”.

search engine - footprinting - edureka

You will find the URL of Edureka Community i.e., This is the first piece of information you have found.

Using the URL of the website, you can find the IP address of the website by pinging to it.

Ping to find the IP address

To find the IP address of Edureka Community website, open the terminal and run the below command:

$ ping

Wait, we wanted to find the IP address of, then why did we ping to

That is because Edureka Community is under the domain and this web application is structured such that the IP address of the community is the same as that of the domain. 

Run the above-mentioned command and you should see a similar output. 

ping edureka community - footprinting - edureka

You can see that we found the IP address of Edureka Community. The IP address is

The IP address is just a tiny piece of information about the website. To get more information, we will use Whois Lookup.

Whois Lookup

Whois Lookup is a tool used to find out information such as DNS, domain names, name servers, IP addresses, etc. Let’s use Whois Lookup to find some more information about the Edureka Community website, open a browser and go to

Enter the website name (or IP address) and click “Search

whois search - footprinting - edureka

This search will display various information about the website. 

whois lookup - footprinting - edureka

whois lookup 2 - footprinting - edureka

You can see in the above screenshot that the Server type being used by Edureka Community is Apache/2.4.27. This gives a point for an Ethical Hacker to start testing. And also, you can limit your attacks only to those that are applicable to Apache/2.4.27 Server. 

This is how Footprinting helps an Ethical Hacker. The more information you gather using Footprinting, the more places you get to look for vulnerabilities. Explore some more ways to find information and see what other information you can gather using Footprinting. If you have a question, ask on Edureka Community and we will get back to you. 

If you wish to learn Cybersecurity and build a colorful career in Cybersecurity, then check out our Cybersecurity Certification Training which comes with instructor-led live training and real-life project experience. This training will help you understand Cybersecurity in depth and help you achieve mastery over the subject.

Learn Cybersecurity the right way with Edureka’s POST-GRADUATE PROGRAM with NIT Rourkela and defend the world’s biggest companies from phishers, hackers and cyber attacks.

Upcoming Batches For Cyber Security Course
Course NameDate
Cyber Security Course

Class Starts on 12th September,2022

12th September

MON-FRI (Weekday Batch)
View Details
Cyber Security Course

Class Starts on 24th September,2022

24th September

SAT&SUN (Weekend Batch)
View Details

Join the discussion

Browse Categories

Send OTP
webinar_success Thank you for registering Join Edureka Meetup community for 100+ Free Webinars each month JOIN MEETUP GROUP

Subscribe to our Newsletter, and get personalized recommendations.

image not found!
image not found!

Footprinting- The Understructure of Ethical Hacking