Sunday, August 23, 2020

FOOTPRITING AND INFORMATION GATHERING USED IN HACKING

WHAT IS FOOTPRITING AND INFORMATION GATHERING IN HACKING?

Footpriting is the technique used for gathering information about computer systems and the entities they belongs too. 
To get this information, a hacker might use various tools and technologies.

Basically it is the first step where hacker gather as much information as possible to find the way for cracking the whole system or target or atleast decide what types of attacks will be more suitable for the target.

Footpriting can be both passive and active.

Reviewing a company's website is an example of passive footprinting, 
whereas attempting to gain access to sensititve information through social engineering is an example of active information gathering.

During this phase hacking, a hacker can collect the following information>- Domain name
-IP Addresses
-Namespaces
-Employee information 
-Phone numbers
-E-mails 
Job information

Tip-You can use http://www.whois.com/ website to get detailed information about a domain name information including its owner,its registrar, date of registration, expiry, name servers owner's contact information etc.

Use of  Footprinting & Information Gathering in People Searching-
Now a days its very easy to find anyone with his/her full name in social media sites like Facebook, Instragram,Twitter,Linkdedin to gather information about date of birth,birthplace, real photos, education detail, hobbies, relationship status etc.

There are several sites like PIPL,PeekYou, Transport Sites such as mptransport,uptransport etc and Job placement Sites such as Shine.com,Naukari.com , Monster.com etc which are very useful for hacker to collect information about anyone.  
Hacker collect the information about you from your Resume which you uploaded on job placement site for seeking a job as well as  hacker collect the information from your vehicle number also from transport sites to know about the owner of vehicle, adderess etc then after they make plan how to attack on victim to earn money after know about him/her from collecting information.




INFORMATION GATHERING-It is the process of collecting the information from different places about any individual company,organization, server, ip address or person.
Most of the hacker spend his time in this process.

Information gathering plays a vital role for both investigating and attacking purposes.This is one of the best way to collect victim data and find the vulnerability and loopholes to get unauthorized modifications,deletion and unauthorized access.



More articles
  1. Hacker Tools For Ios
  2. Hack Tools Mac
  3. Install Pentest Tools Ubuntu
  4. Hacking Tools For Games
  5. Pentest Tools Website Vulnerability
  6. Pentest Tools Subdomain
  7. Hacker Search Tools
  8. Pentest Tools Nmap
  9. Hack Tools Mac
  10. Hacking Tools For Games
  11. What Are Hacking Tools
  12. Hacker Security Tools
  13. Hack Tools For Ubuntu
  14. Pentest Tools For Android
  15. Game Hacking
  16. Hacker Tool Kit
  17. Hack Tools Mac
  18. Hack Tools For Pc
  19. Hacking Tools And Software
  20. How To Hack
  21. Pentest Tools Linux
  22. Pentest Tools Subdomain
  23. Pentest Tools Apk
  24. Hacking Tools For Beginners
  25. Nsa Hack Tools Download
  26. Termux Hacking Tools 2019
  27. Hacker Tools Mac
  28. Hacking Tools For Kali Linux
  29. Pentest Box Tools Download
  30. Install Pentest Tools Ubuntu
  31. Hacker Security Tools
  32. Hacker Tools For Ios
  33. Pentest Tools
  34. Hacker Tools Windows
  35. Hacking Tools For Windows 7
  36. Usb Pentest Tools
  37. Pentest Tools Bluekeep
  38. Pentest Tools For Windows
  39. Android Hack Tools Github
  40. How To Install Pentest Tools In Ubuntu
  41. Hacker Tools For Ios
  42. Pentest Tools
  43. Hacking Tools Hardware
  44. Pentest Tools Website
  45. Hackers Toolbox
  46. Pentest Tools Windows
  47. Hack Apps
  48. Hacker Hardware Tools
  49. Hack Tool Apk No Root
  50. Hacker Tools Windows
  51. Hacking Tools For Windows Free Download
  52. Pentest Tools
  53. Pentest Reporting Tools
  54. Pentest Tools For Ubuntu
  55. Pentest Tools Nmap
  56. Hacker Tools List
  57. Hacker Tools 2019
  58. Hack Tools Download
  59. Computer Hacker
  60. Pentest Tools Website Vulnerability
  61. Pentest Tools Open Source
  62. Pentest Tools Kali Linux
  63. Hacker Tools Github
  64. Hack Tool Apk No Root
  65. How To Make Hacking Tools
  66. Hacking Tools Online
  67. Hacking Tools Name
  68. New Hacker Tools
  69. How To Hack
  70. Pentest Tools Url Fuzzer
  71. Hackers Toolbox
  72. Hacker Tools List
  73. Hacker Tools Apk Download
  74. Pentest Tools Apk
  75. Hacking Tools For Kali Linux
  76. Pentest Tools Download
  77. Hacking Tools Windows
  78. Hacking Tools For Games
  79. Hack Tools For Pc
  80. Hacking Tools Usb
  81. Black Hat Hacker Tools
  82. Hak5 Tools
  83. How To Hack
  84. What Are Hacking Tools
  85. Pentest Tools Website
  86. Hack Tools For Pc
  87. Pentest Tools For Windows
  88. Install Pentest Tools Ubuntu
  89. Hacking Tools For Games
  90. World No 1 Hacker Software
  91. Bluetooth Hacking Tools Kali
  92. Pentest Tools Tcp Port Scanner
  93. Bluetooth Hacking Tools Kali
  94. Tools For Hacker
  95. Nsa Hacker Tools
  96. Hacking Tools For Windows Free Download
  97. Hacking App
  98. Pentest Tools Online
  99. Hackers Toolbox
  100. Pentest Tools Download
  101. Hack Tools Mac
  102. Hacker Hardware Tools
  103. Hack App
  104. Hacking Tools Online
  105. Hack Apps
  106. Pentest Tools Windows
  107. Hacking Tools Pc
  108. Hackers Toolbox
  109. Best Hacking Tools 2019
  110. Hacking Tools For Windows Free Download
  111. Hacker Tools Github
  112. Easy Hack Tools
  113. Pentest Tools
  114. Hackrf Tools
  115. How To Install Pentest Tools In Ubuntu
  116. Hacker Tools
  117. Pentest Tools Nmap
  118. Top Pentest Tools
  119. Pentest Tools Find Subdomains
  120. Hacker Tools For Ios
  121. Hacking Tools And Software
  122. Hacking Tools For Windows
  123. Hacker Tools Hardware
  124. Hacker Tools Apk
  125. Hacking Tools Software
  126. Tools Used For Hacking
  127. Easy Hack Tools
  128. Pentest Tools Subdomain
  129. Pentest Tools Tcp Port Scanner
  130. Growth Hacker Tools
  131. Hacker Tools Mac
  132. Nsa Hack Tools Download
  133. Hak5 Tools
  134. Hacker Tools Online
  135. Install Pentest Tools Ubuntu
  136. Hacking Tools Download
  137. Hack Tools Download
  138. Top Pentest Tools
  139. Hacker Tool Kit
  140. Hacker Tools For Mac

0 Comments:

Post a Comment

<< Home