Which of the following techniques is described in the above scenario?

Louis, a professional hacker, had used specialized tools or search engines to encrypt all his browsing activity and navigate anonymously to obtain sensitive/hidden information about official government or federal databases. After gathering the Information, he successfully performed an attack on the target government organization without being traced .

Which of the following techniques is described in the above scenario?
A . Dark web footprinting
B . VoIP footpnnting
C . VPN footprinting
D . website footprinting

Answer: A

Explanation:

VoIP (Voice over Internet Protocol) is a web convention that permits the transmission of voice brings over the web. It does as such by changing over the ordinary telephone signals into advanced signs. Virtual Private Networks(VPN) give a protected association with an associations’ organization. Along these lines, VoIP traffic can disregard a SSL-based VPN, successfully scrambling VoIP administrations.

When leading surveillance, in the underlying phases of VoIP footprinting, the accompanying freely accessible data can be normal:

✑ All open ports and administrations of the gadgets associated with the VoIP organization

✑ The public VoIP worker IP address

✑ The working arrangement of the worker running VoIP

✑ The organization framework

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments