answersLogoWhite

0


Want this question answered?

Be notified when an answer is posted

Add your answer:

Earn +20 pts
Q: What does it mean when a hacker is foot-printing a victim?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What are the three phases a computer hacker goes through prior to attacking their victim?

What are the three phases a hacker goes through prior to attacking their victim?a. Footprinting, scanning, and enumerationb. Footprinting, searching, and enumerationc. Footprinting, scanning, and evaluationd. Footprinting, scanning, and engineering


What are the three phases a hacker goes through prior to attacking their victim?

The three phases a hacker goes through prior to attacking their victim are reconnaissance, scanning, and gaining access. During reconnaissance, the hacker gathers information about the target. In the scanning phase, they look for vulnerabilities that can be exploited. Finally, in the gaining access phase, the hacker exploits the vulnerabilities to access the target system.


What is footprinting?

the aweser is to go eat a llama


What does h4x mean?

Hacker.


What is the next step to be performed after footprinting in CEH methodology?

enumeration


What do you call the DNA cut into smaller sequences by proteins?

footprinting


What does flaming mean on the computer?

it mean there is a hacker in your computer


If there is random music playing does that mean there is a hacker?

No.


Are You Victim of Keylogger Attacks?

A Keylogger is a malware which records every keystroke of the victim and sends this data to the hacker, who then has a complete collection of the victims passwords and sensitive information. Keyloggers are used in most hacking cases involving password theft.


Correct order of the three pre-hacking phases?

foot-printing, enumeration, and scanning


What are the steps involved in the process of ethical hacking?

Footprinting / Information Gathering :▫Gathering potential information about target system▫A good hacker consumes 90% of time for this phase•Scanning :▫Network is scanned for any vulnerabilities•System Hacking :▫Involves actual hacking▫Taking advantage of vulnerabilities found during scanning, penetrate the victim's system•Maintaining Access :▫Making provisions by planting backdoors•Covering Tracks :▫Removing all the traces of his presence in system by removing log files & event logs


What is the Swedish word for hacker?

Hacker is hacker in Swedish.