FOOTPRITING AND INFORMATION GATHERING USED IN HACKING
WHAT IS FOOTPRITING AND INFORMATION GATHERING IN HACKING?
Footpriting is the technique used for gathering information about computer systems and the entities they belongs too.
To get this information, a hacker might use various tools and technologies.
Basically it is the first step where hacker gather as much information as possible to find the way for cracking the whole system or target or atleast decide what types of attacks will be more suitable for the target.
Footpriting can be both passive and active.
Reviewing a company's website is an example of passive footprinting,
whereas attempting to gain access to sensititve information through social engineering is an example of active information gathering.
During this phase hacking, a hacker can collect the following information>- Domain name
-IP Addresses
-Namespaces
-Employee information
-Phone numbers
-E-mails
Job information
Tip-You can use http://www.whois.com/ website to get detailed information about a domain name information including its owner,its registrar, date of registration, expiry, name servers owner's contact information etc.
Use of Footprinting & Information Gathering in People Searching-
Now a days its very easy to find anyone with his/her full name in social media sites like Facebook, Instragram,Twitter,Linkdedin to gather information about date of birth,birthplace, real photos, education detail, hobbies, relationship status etc.
There are several sites like PIPL,PeekYou, Transport Sites such as mptransport,uptransport etc and Job placement Sites such as Shine.com,Naukari.com , Monster.com etc which are very useful for hacker to collect information about anyone.
Hacker collect the information about you from your Resume which you uploaded on job placement site for seeking a job as well as hacker collect the information from your vehicle number also from transport sites to know about the owner of vehicle, adderess etc then after they make plan how to attack on victim to earn money after know about him/her from collecting information.
INFORMATION GATHERING-It is the process of collecting the information from different places about any individual company,organization, server, ip address or person.
Most of the hacker spend his time in this process.
Information gathering plays a vital role for both investigating and attacking purposes.This is one of the best way to collect victim data and find the vulnerability and loopholes to get unauthorized modifications,deletion and unauthorized access.
More articlesFootpriting is the technique used for gathering information about computer systems and the entities they belongs too.
To get this information, a hacker might use various tools and technologies.
Basically it is the first step where hacker gather as much information as possible to find the way for cracking the whole system or target or atleast decide what types of attacks will be more suitable for the target.
Footpriting can be both passive and active.
Reviewing a company's website is an example of passive footprinting,
whereas attempting to gain access to sensititve information through social engineering is an example of active information gathering.
During this phase hacking, a hacker can collect the following information>- Domain name
-IP Addresses
-Namespaces
-Employee information
-Phone numbers
-E-mails
Job information
Tip-You can use http://www.whois.com/ website to get detailed information about a domain name information including its owner,its registrar, date of registration, expiry, name servers owner's contact information etc.
Use of Footprinting & Information Gathering in People Searching-
Now a days its very easy to find anyone with his/her full name in social media sites like Facebook, Instragram,Twitter,Linkdedin to gather information about date of birth,birthplace, real photos, education detail, hobbies, relationship status etc.
There are several sites like PIPL,PeekYou, Transport Sites such as mptransport,uptransport etc and Job placement Sites such as Shine.com,Naukari.com , Monster.com etc which are very useful for hacker to collect information about anyone.
Hacker collect the information about you from your Resume which you uploaded on job placement site for seeking a job as well as hacker collect the information from your vehicle number also from transport sites to know about the owner of vehicle, adderess etc then after they make plan how to attack on victim to earn money after know about him/her from collecting information.
INFORMATION GATHERING-It is the process of collecting the information from different places about any individual company,organization, server, ip address or person.
Most of the hacker spend his time in this process.
Information gathering plays a vital role for both investigating and attacking purposes.This is one of the best way to collect victim data and find the vulnerability and loopholes to get unauthorized modifications,deletion and unauthorized access.
- Hacker Tools For Ios
- Hack Tools Mac
- Install Pentest Tools Ubuntu
- Hacking Tools For Games
- Pentest Tools Website Vulnerability
- Pentest Tools Subdomain
- Hacker Search Tools
- Pentest Tools Nmap
- Hack Tools Mac
- Hacking Tools For Games
- What Are Hacking Tools
- Hacker Security Tools
- Hack Tools For Ubuntu
- Pentest Tools For Android
- Game Hacking
- Hacker Tool Kit
- Hack Tools Mac
- Hack Tools For Pc
- Hacking Tools And Software
- How To Hack
- Pentest Tools Linux
- Pentest Tools Subdomain
- Pentest Tools Apk
- Hacking Tools For Beginners
- Nsa Hack Tools Download
- Termux Hacking Tools 2019
- Hacker Tools Mac
- Hacking Tools For Kali Linux
- Pentest Box Tools Download
- Install Pentest Tools Ubuntu
- Hacker Security Tools
- Hacker Tools For Ios
- Pentest Tools
- Hacker Tools Windows
- Hacking Tools For Windows 7
- Usb Pentest Tools
- Pentest Tools Bluekeep
- Pentest Tools For Windows
- Android Hack Tools Github
- How To Install Pentest Tools In Ubuntu
- Hacker Tools For Ios
- Pentest Tools
- Hacking Tools Hardware
- Pentest Tools Website
- Hackers Toolbox
- Pentest Tools Windows
- Hack Apps
- Hacker Hardware Tools
- Hack Tool Apk No Root
- Hacker Tools Windows
- Hacking Tools For Windows Free Download
- Pentest Tools
- Pentest Reporting Tools
- Pentest Tools For Ubuntu
- Pentest Tools Nmap
- Hacker Tools List
- Hacker Tools 2019
- Hack Tools Download
- Computer Hacker
- Pentest Tools Website Vulnerability
- Pentest Tools Open Source
- Pentest Tools Kali Linux
- Hacker Tools Github
- Hack Tool Apk No Root
- How To Make Hacking Tools
- Hacking Tools Online
- Hacking Tools Name
- New Hacker Tools
- How To Hack
- Pentest Tools Url Fuzzer
- Hackers Toolbox
- Hacker Tools List
- Hacker Tools Apk Download
- Pentest Tools Apk
- Hacking Tools For Kali Linux
- Pentest Tools Download
- Hacking Tools Windows
- Hacking Tools For Games
- Hack Tools For Pc
- Hacking Tools Usb
- Black Hat Hacker Tools
- Hak5 Tools
- How To Hack
- What Are Hacking Tools
- Pentest Tools Website
- Hack Tools For Pc
- Pentest Tools For Windows
- Install Pentest Tools Ubuntu
- Hacking Tools For Games
- World No 1 Hacker Software
- Bluetooth Hacking Tools Kali
- Pentest Tools Tcp Port Scanner
- Bluetooth Hacking Tools Kali
- Tools For Hacker
- Nsa Hacker Tools
- Hacking Tools For Windows Free Download
- Hacking App
- Pentest Tools Online
- Hackers Toolbox
- Pentest Tools Download
- Hack Tools Mac
- Hacker Hardware Tools
- Hack App
- Hacking Tools Online
- Hack Apps
- Pentest Tools Windows
- Hacking Tools Pc
- Hackers Toolbox
- Best Hacking Tools 2019
- Hacking Tools For Windows Free Download
- Hacker Tools Github
- Easy Hack Tools
- Pentest Tools
- Hackrf Tools
- How To Install Pentest Tools In Ubuntu
- Hacker Tools
- Pentest Tools Nmap
- Top Pentest Tools
- Pentest Tools Find Subdomains
- Hacker Tools For Ios
- Hacking Tools And Software
- Hacking Tools For Windows
- Hacker Tools Hardware
- Hacker Tools Apk
- Hacking Tools Software
- Tools Used For Hacking
- Easy Hack Tools
- Pentest Tools Subdomain
- Pentest Tools Tcp Port Scanner
- Growth Hacker Tools
- Hacker Tools Mac
- Nsa Hack Tools Download
- Hak5 Tools
- Hacker Tools Online
- Install Pentest Tools Ubuntu
- Hacking Tools Download
- Hack Tools Download
- Top Pentest Tools
- Hacker Tool Kit
- Hacker Tools For Mac
0 Comments:
Post a Comment
<< Home