Gathering Information: Foot printing Student NameInstitution nameCourseInstructorDateFoot printing objectivesFoot printing involves gathering information about a target system (Srinivasa Rao, Shreya, Kumar & Srinivasa Rao, 2020). To attack a system, an attacker must first learn about the target system to know of potential ways to break in, which makes foot printing the first step of an attack. Foot printing finds system loopholes and creates an attack plan. Foot printing uses various methods to gathers system information such as user and group names, SNMP information, routing tables, system banners, domain name system information, URLs, staff IDs, phone numbers, email addresses, as well as security configurations. The information gathered can later be used to identify weakness in the target’s security. There are certain tools and online resources that can help collect information on a target. These include search engines and online sources, Whois, IP Geolocation, and DNS Interrogation, email foot printing, website foot printing, cloning websites, and network foot printing. Types of foot printing include active and passive foot printing. The former collects information by communicating directly with the target while the latter gathers information without any direct