External Footprint Analysis

PRIMARY CONTACT: Carl N. Kriebel CISSP

Schneider Downs consultants will use commonly available open source tools, scanners and databases which can be acquired by any attacker to obtain a blueprint of the client and its Internet profile.

Our team’s approach external foot printing without any significant prior knowledge about the client’s network. We gather domain names, IP network ranges, and other information about hosts, such as operating systems and applications. This service may discover new hosts or applications on the network that the client management is not aware of, such as vendor, employee, or partner-added systems.
  • Interview to scope the analysis
  • Conduct public domain searches, custom IP and domain scans, DNS scans, metadata scans, and web bug attacks
  • Review and validate findings and refine configuration to re-scan as necessary; write report
  • Report, review, and knowledge transfer

View our additional IT Risk Advisory services and capabilities

Breached?

Every moment counts. For urgent requests, contact the Schneider Downs digital forensics and incident response team at 1-800-993-8937. For all other requests, please complete the form below.

"*" indicates required fields

This field is for validation purposes and should be left unchanged.