Pages

Saturday, 22 August 2020

FOOTPRITING AND INFORMATION GATHERING USED IN HACKING

WHAT IS FOOTPRITING AND INFORMATION GATHERING IN HACKING?

Footpriting is the technique used for gathering information about computer systems and the entities they belongs too. 
To get this information, a hacker might use various tools and technologies.

Basically it is the first step where hacker gather as much information as possible to find the way for cracking the whole system or target or atleast decide what types of attacks will be more suitable for the target.

Footpriting can be both passive and active.

Reviewing a company's website is an example of passive footprinting, 
whereas attempting to gain access to sensititve information through social engineering is an example of active information gathering.

During this phase hacking, a hacker can collect the following information>- Domain name
-IP Addresses
-Namespaces
-Employee information 
-Phone numbers
-E-mails 
Job information

Tip-You can use http://www.whois.com/ website to get detailed information about a domain name information including its owner,its registrar, date of registration, expiry, name servers owner's contact information etc.

Use of  Footprinting & Information Gathering in People Searching-
Now a days its very easy to find anyone with his/her full name in social media sites like Facebook, Instragram,Twitter,Linkdedin to gather information about date of birth,birthplace, real photos, education detail, hobbies, relationship status etc.

There are several sites like PIPL,PeekYou, Transport Sites such as mptransport,uptransport etc and Job placement Sites such as Shine.com,Naukari.com , Monster.com etc which are very useful for hacker to collect information about anyone.  
Hacker collect the information about you from your Resume which you uploaded on job placement site for seeking a job as well as  hacker collect the information from your vehicle number also from transport sites to know about the owner of vehicle, adderess etc then after they make plan how to attack on victim to earn money after know about him/her from collecting information.




INFORMATION GATHERING-It is the process of collecting the information from different places about any individual company,organization, server, ip address or person.
Most of the hacker spend his time in this process.

Information gathering plays a vital role for both investigating and attacking purposes.This is one of the best way to collect victim data and find the vulnerability and loopholes to get unauthorized modifications,deletion and unauthorized access.



Related word


  1. Pentest Tools Website Vulnerability
  2. Hacker Tool Kit
  3. Pentest Tools Apk
  4. Hacking Tools Mac
  5. Hacking Tools Online
  6. Hacking Tools Online
  7. Hack Tools Download
  8. Nsa Hack Tools
  9. Termux Hacking Tools 2019
  10. Github Hacking Tools
  11. Easy Hack Tools
  12. Hacking Tools Download
  13. Hacking Tools And Software
  14. Hacker Tools Apk Download
  15. Pentest Box Tools Download
  16. Hack Tools For Games
  17. Pentest Tools Find Subdomains
  18. Hacking Apps
  19. Hack Tool Apk
  20. Hacking Tools
  21. Hack Tools Github
  22. Hack And Tools
  23. Hack Tools 2019
  24. Hacker Tools List
  25. Nsa Hack Tools Download
  26. Hack Tools Pc
  27. Pentest Tools For Mac
  28. Hacker Security Tools
  29. Hacking Tools Github
  30. Hack Tool Apk No Root
  31. Nsa Hacker Tools
  32. Hacking Tools For Mac
  33. Hacker Tools Software
  34. Hacking Tools
  35. Hacking Tools Name
  36. Hack Tools Mac
  37. Hacking Tools For Beginners
  38. Pentest Box Tools Download
  39. Hackrf Tools
  40. Pentest Tools For Windows
  41. New Hack Tools
  42. Hacker Tools Free Download
  43. Hacking Tools Kit
  44. New Hack Tools
  45. Hacking Tools For Mac
  46. Hack Apps
  47. Computer Hacker
  48. Hacker Tools Online
  49. Hacking Tools Software
  50. Pentest Tools Tcp Port Scanner
  51. Pentest Reporting Tools
  52. Pentest Tools
  53. Hackers Toolbox
  54. Hacker Tools For Mac
  55. Wifi Hacker Tools For Windows
  56. Kik Hack Tools
  57. Pentest Tools Nmap
  58. Hacking Tools Free Download
  59. Hack Tools Pc
  60. Blackhat Hacker Tools
  61. Pentest Tools Website
  62. Hacker Search Tools
  63. Pentest Tools Download
  64. Hack And Tools
  65. Pentest Tools Apk
  66. Pentest Tools Review
  67. Hacking Tools Free Download
  68. Hacker Tools Apk
  69. Hacking Tools Windows
  70. Pentest Tools Alternative
  71. Pentest Tools Online
  72. Hack Tools Pc
  73. Hacking App
  74. Hacking App
  75. Hacking Tools For Pc
  76. Hacking Tools Pc
  77. Github Hacking Tools
  78. Hack App
  79. Hacking Tools Download
  80. How To Make Hacking Tools
  81. Hacking Tools And Software
  82. Hacking Tools For Beginners
  83. Best Pentesting Tools 2018
  84. Hacking App
  85. Pentest Tools Tcp Port Scanner
  86. Hack Tools For Ubuntu
  87. Hacking Tools Mac
  88. How To Hack
  89. Best Hacking Tools 2020
  90. Hacker Tools For Mac
  91. Tools 4 Hack
  92. Hacking Tools Free Download
  93. Usb Pentest Tools
  94. Github Hacking Tools
  95. Hacking Tools Windows 10
  96. Pentest Tools For Mac
  97. Ethical Hacker Tools
  98. Hacking Tools For Kali Linux
  99. Best Hacking Tools 2019

No comments:

Post a Comment