Contact Us Today 01642 716680


Definition: Footprinting is the process of collecting as much information as possible about a target system, network, or organisation to find ways to infiltrate it. It is typically the first step in reconnaissance, which attackers or security professionals use to gather necessary intelligence before launching an attack or conducting a security assessment.

Footprinting can be executed passively (without directly interacting with the target systems) or actively (through direct engagement with the systems). The aim is to construct a complete profile that includes network ranges, domain details, security posture, points of entry, and even employee information. Tools and techniques used in footprinting include public records searches, DNS queries, network enumeration, and social engineering.

Understanding footprinting is essential for cybersecurity because it helps organisations anticipate and protect against the types of information attackers can gather to exploit their systems or network.

Key Characteristics:

  • Information Gathering: Systematic collection of information about a target to prepare for subsequent attacks or assessments.
  • Non-intrusive: Primarily conducted without directly affecting the target, thereby reducing the chance of detection.
  • Scope Definition: Helps in defining the scope and focus areas of a security assessment or penetration test.
  • Data Sources: Utilises various sources, including public records, domain registration data, network surveys, and social media.


  • Real-World Example: An ethical hacker hired by a company uses footprinting to identify exposed details about the company’s network infrastructure, aiding in the development of a more robust security strategy.
  • Hypothetical Scenario: A cybercriminal performs footprinting on an e-commerce website, uncovering details about server software versions and network topology to plan for an SQL injection attack.

Related Terms:

  • Reconnaissance: The broader category of intelligence-gathering activities in cybersecurity, where footprinting is the initial stage.
  • Social Engineering: An attack vector that relies on human interaction to obtain or compromise information; often incorporates techniques utilised in footprinting.
  • Enumeration: A process closely related to footprinting, which involves extracting detailed user names, machine names, network resources, and other services from a system.

What is the OWASP Top 10: Download our flash cards to find out.

Inside you will find a description of the most common web vulnerabilities.

Contact us

Get a free, no obligation quote from one of our expert staff.