The document discusses footprinting techniques for security auditors. It covers gathering publicly available information about targets through tools like Whois, DNS lookups, search engines and network mappers to identify domains, IP addresses, systems and names. It then discusses active footprinting using port scanners like NMAP to detect open ports and services, identify operating systems and check for vulnerabilities. NMAP scripts can automate tasks like banner grabbing, HTTP enumeration and vulnerability detection for services like MySQL. Other tools mentioned include Maltego, Shodan, Censys and the NSE script library for more advanced information gathering.
Related topics: