Search This Blog

Monday, January 22, 2024

FOOTPRITING AND INFORMATION GATHERING USED IN HACKING

WHAT IS FOOTPRITING AND INFORMATION GATHERING IN HACKING?

Footpriting is the technique used for gathering information about computer systems and the entities they belongs too. 
To get this information, a hacker might use various tools and technologies.

Basically it is the first step where hacker gather as much information as possible to find the way for cracking the whole system or target or atleast decide what types of attacks will be more suitable for the target.

Footpriting can be both passive and active.

Reviewing a company's website is an example of passive footprinting, 
whereas attempting to gain access to sensititve information through social engineering is an example of active information gathering.

During this phase hacking, a hacker can collect the following information>- Domain name
-IP Addresses
-Namespaces
-Employee information 
-Phone numbers
-E-mails 
Job information

Tip-You can use http://www.whois.com/ website to get detailed information about a domain name information including its owner,its registrar, date of registration, expiry, name servers owner's contact information etc.

Use of  Footprinting & Information Gathering in People Searching-
Now a days its very easy to find anyone with his/her full name in social media sites like Facebook, Instragram,Twitter,Linkdedin to gather information about date of birth,birthplace, real photos, education detail, hobbies, relationship status etc.

There are several sites like PIPL,PeekYou, Transport Sites such as mptransport,uptransport etc and Job placement Sites such as Shine.com,Naukari.com , Monster.com etc which are very useful for hacker to collect information about anyone.  
Hacker collect the information about you from your Resume which you uploaded on job placement site for seeking a job as well as  hacker collect the information from your vehicle number also from transport sites to know about the owner of vehicle, adderess etc then after they make plan how to attack on victim to earn money after know about him/her from collecting information.




INFORMATION GATHERING-It is the process of collecting the information from different places about any individual company,organization, server, ip address or person.
Most of the hacker spend his time in this process.

Information gathering plays a vital role for both investigating and attacking purposes.This is one of the best way to collect victim data and find the vulnerability and loopholes to get unauthorized modifications,deletion and unauthorized access.



Continue reading
  1. Hack Tools 2019
  2. Hacker Tools Free Download
  3. How To Install Pentest Tools In Ubuntu
  4. Termux Hacking Tools 2019
  5. Underground Hacker Sites
  6. Beginner Hacker Tools
  7. Hacking Apps
  8. Beginner Hacker Tools
  9. Hacker Tools Online
  10. Best Pentesting Tools 2018
  11. Hacker Techniques Tools And Incident Handling
  12. Pentest Tools Url Fuzzer
  13. Hacking Tools Name
  14. Blackhat Hacker Tools
  15. Pentest Tools Tcp Port Scanner
  16. Pentest Tools Website Vulnerability
  17. Hacking Tools 2019
  18. Hacker Security Tools
  19. Hacking Tools 2019
  20. Hacking Tools Hardware
  21. Hacking Tools 2019
  22. Pentest Tools For Ubuntu
  23. Hack Tools Online
  24. What Are Hacking Tools
  25. Hack And Tools
  26. Pentest Tools Find Subdomains
  27. Hacker Tools 2020
  28. Hacking Tools Kit
  29. Hacking Tools Download
  30. Hacking Tools Download
  31. Hackers Toolbox
  32. Pentest Tools Website Vulnerability
  33. Hack Tool Apk
  34. Usb Pentest Tools
  35. Usb Pentest Tools
  36. Hacker Tools Hardware
  37. Android Hack Tools Github
  38. Install Pentest Tools Ubuntu
  39. Pentest Tools Bluekeep
  40. Pentest Tools Framework
  41. Best Hacking Tools 2019
  42. Tools 4 Hack
  43. Pentest Tools Nmap
  44. Pentest Tools Find Subdomains
  45. Hacker Tools Apk
  46. Hacker Tools Github
  47. Pentest Tools Free
  48. Computer Hacker
  49. Hacking Tools Free Download
  50. Hack Tools Github
  51. Termux Hacking Tools 2019
  52. Hacking Tools For Pc
  53. Hacking Tools 2019
  54. Pentest Tools Subdomain
  55. Best Hacking Tools 2020
  56. Pentest Tools List
  57. Github Hacking Tools
  58. Hacker Tools Linux
  59. Hacking Tools Free Download
  60. Hacker Tools 2019
  61. Pentest Tools Linux
  62. Hack Tools Github
  63. Game Hacking
  64. Hacker Tools Hardware
  65. Hackrf Tools
  66. Pentest Tools Linux
  67. Hacking Tools For Windows
  68. Hacker Tools For Ios
  69. Hacker Tools Windows
  70. Hacking Tools For Windows
  71. Best Pentesting Tools 2018
  72. Nsa Hack Tools
  73. What Is Hacking Tools
  74. Pentest Tools For Mac
  75. Hacker Tools 2019
  76. Hack Tools Download
  77. Github Hacking Tools
  78. Hack Rom Tools
  79. Hacking Tools Usb
  80. Hackers Toolbox
  81. Hacking Tools For Windows Free Download
  82. Hacking Tools 2020
  83. Hack Tool Apk
  84. Hacker Tools Github
  85. Pentest Tools Apk
  86. Hacking Tools Software
  87. Pentest Tools Website Vulnerability
  88. Pentest Tools Bluekeep
  89. Hack Tools Online
  90. Hacking Tools For Windows
  91. Pentest Tools Find Subdomains
  92. Hack Tools Pc
  93. Hacker Tools Mac
  94. Hack Tools
  95. Beginner Hacker Tools
  96. Pentest Tools Url Fuzzer
  97. Ethical Hacker Tools
  98. Hack Website Online Tool
  99. Pentest Tools Review
  100. Hack Tool Apk No Root
  101. Hacker Tools
  102. Computer Hacker
  103. Pentest Tools For Windows
  104. Pentest Tools Free
  105. Game Hacking
  106. Best Hacking Tools 2019
  107. Hacker Tools 2019
  108. Hacking Tools Name
  109. Hacker Tools Online
  110. Pentest Tools Kali Linux
  111. Hacking Tools 2019
  112. Hack Website Online Tool
  113. Pentest Tools Github
  114. Hacking Tools Pc
  115. What Are Hacking Tools
  116. Pentest Tools Open Source
  117. Hack Tools For Ubuntu
  118. What Are Hacking Tools
  119. Hacker Security Tools
  120. Physical Pentest Tools
  121. Hacking Tools Usb
  122. Best Pentesting Tools 2018
  123. Android Hack Tools Github
  124. Pentest Tools Apk
  125. Hacker Tools Github
  126. Hacking Tools Windows 10
  127. Pentest Tools Online
  128. Hacker Techniques Tools And Incident Handling
  129. Pentest Tools Framework
  130. Blackhat Hacker Tools
  131. Wifi Hacker Tools For Windows
  132. Hacking Tools Usb
  133. Pentest Tools Linux
  134. Pentest Tools Windows

No comments:

Post a Comment