Q: What is the primary goal of footprinting in ethical hacking? A: The primary goal of footprinting is to gather information about a target system to identify vulnerabilities that can be exploited. Q: Which search operators can be used in Google Hacking? A: Operators such as site:, allinurl:, intitle:, inurl: are used in Google Hacking. Q: What is the Google Hacking Database (GHDB)? A: GHDB is a resource that lists search queries for finding sensitive data on the internet. Q: Name two IoT search engines used in footprinting. A: Shodan and Censys. Q: What type of information can be gathered from job sites? A: Job sites can reveal details about the target's infrastructure, including hardware, software, and network information. Q: What is the purpose of theHarvester tool? A: TheHarvester is used to collect publicly available email addresses from search engines. Q: What is the role of Tor Browser in footprinting? A: Tor Browser is used to access the deep and dark web to gather hidden or unindexed information. Q: Which tools can attackers use to gather geographical location information? A: Tools such as Google Maps, Yahoo Maps, and Wikimapia. Q: What can attackers achieve by using advanced image search techniques? A: They can find specific images related to the target and analyze them for hidden information. Q: What information can be obtained from IoT search engines? A: IoT search engines can reveal details about publicly accessible IoT devices, such as SCADA systems, traffic control systems, and industrial appliances. Q: How can social networking sites be useful in footprinting? A: They provide rich information about an organization's infrastructure and employee details, useful for building an attack strategy. Q: What kind of information is typically found using meta search engines? A: Meta search engines aggregate results from multiple search engines, providing a comprehensive set of information. Q: What is dumpster diving? A: Dumpster diving involves searching through an organization's trash to find valuable information. Q: What does shoulder surfing entail? A: Shoulder surfing involves secretly observing someone’s activities, such as entering usernames and passwords, to gain sensitive information. Q: What is impersonation in the context of footprinting and reconnaissance? A: Impersonation is when an attacker pretends to be a legitimate or authorized person to deceive targets into revealing information. https://quizlet.com/au/924537925/module-2-footprinting-and-reconnaissance-flash-cards/?i=2hfw1u&x=1jqt