sábado, 27 de enero de 2024

FOOTPRITING AND INFORMATION GATHERING USED IN HACKING

WHAT IS FOOTPRITING AND INFORMATION GATHERING IN HACKING?

Footpriting is the technique used for gathering information about computer systems and the entities they belongs too. 
To get this information, a hacker might use various tools and technologies.

Basically it is the first step where hacker gather as much information as possible to find the way for cracking the whole system or target or atleast decide what types of attacks will be more suitable for the target.

Footpriting can be both passive and active.

Reviewing a company's website is an example of passive footprinting, 
whereas attempting to gain access to sensititve information through social engineering is an example of active information gathering.

During this phase hacking, a hacker can collect the following information>- Domain name
-IP Addresses
-Namespaces
-Employee information 
-Phone numbers
-E-mails 
Job information

Tip-You can use http://www.whois.com/ website to get detailed information about a domain name information including its owner,its registrar, date of registration, expiry, name servers owner's contact information etc.

Use of  Footprinting & Information Gathering in People Searching-
Now a days its very easy to find anyone with his/her full name in social media sites like Facebook, Instragram,Twitter,Linkdedin to gather information about date of birth,birthplace, real photos, education detail, hobbies, relationship status etc.

There are several sites like PIPL,PeekYou, Transport Sites such as mptransport,uptransport etc and Job placement Sites such as Shine.com,Naukari.com , Monster.com etc which are very useful for hacker to collect information about anyone.  
Hacker collect the information about you from your Resume which you uploaded on job placement site for seeking a job as well as  hacker collect the information from your vehicle number also from transport sites to know about the owner of vehicle, adderess etc then after they make plan how to attack on victim to earn money after know about him/her from collecting information.




INFORMATION GATHERING-It is the process of collecting the information from different places about any individual company,organization, server, ip address or person.
Most of the hacker spend his time in this process.

Information gathering plays a vital role for both investigating and attacking purposes.This is one of the best way to collect victim data and find the vulnerability and loopholes to get unauthorized modifications,deletion and unauthorized access.



Read more


  1. Github Hacking Tools
  2. Hacking Tools Name
  3. Hacking Tools For Mac
  4. Pentest Tools Port Scanner
  5. How To Hack
  6. Pentest Reporting Tools
  7. Pentest Tools Bluekeep
  8. Hacker Security Tools
  9. Hacker Tools Mac
  10. Nsa Hack Tools Download
  11. Hack Tools Mac
  12. Hacker Tools For Ios
  13. Hacker Techniques Tools And Incident Handling
  14. Hack Tools Mac
  15. What Is Hacking Tools
  16. Hacker Tools Windows
  17. Hack Tool Apk
  18. Computer Hacker
  19. Hacker Tools Windows
  20. Pentest Reporting Tools
  21. Pentest Tools Linux
  22. Pentest Tools Bluekeep
  23. Pentest Tools Linux
  24. Hacker Tools Mac
  25. Pentest Tools Apk
  26. Hacking Tools For Mac
  27. Hacker Techniques Tools And Incident Handling
  28. Hacking Tools Windows 10
  29. Hack Tools
  30. Pentest Tools Review
  31. Underground Hacker Sites
  32. Pentest Automation Tools
  33. Pentest Tools Linux
  34. Bluetooth Hacking Tools Kali
  35. Hacking Tools Software
  36. Growth Hacker Tools
  37. Hacking Tools For Mac
  38. Hacking Apps
  39. Pentest Tools Port Scanner
  40. Pentest Tools
  41. Blackhat Hacker Tools
  42. Pentest Tools For Mac
  43. Hacker Tools Software
  44. Hacker Tools 2019
  45. Hacking Tools For Mac
  46. Pentest Tools Github
  47. Pentest Tools For Ubuntu
  48. Hacking Tools Free Download
  49. Hacker Tools For Mac
  50. Pentest Tools Find Subdomains
  51. How To Install Pentest Tools In Ubuntu
  52. Hack Tools For Mac
  53. Pentest Tools Port Scanner
  54. Hacking Tools For Games
  55. New Hack Tools
  56. Kik Hack Tools
  57. Hacker Tools
  58. Hacker Tools Github
  59. Hacks And Tools
  60. Hacking Apps
  61. Hack App
  62. Hacking Tools Usb
  63. Hacking Tools
  64. Hacking Tools For Beginners
  65. Hacking Tools Windows 10
  66. Hacking Tools For Mac
  67. Pentest Tools Subdomain
  68. Hackers Toolbox
  69. Pentest Tools Review
  70. Hacking Tools For Pc
  71. Hacking Tools Software
  72. Install Pentest Tools Ubuntu
  73. Hack Tools For Windows
  74. Pentest Tools Alternative
  75. Hacker Tool Kit
  76. Usb Pentest Tools
  77. Pentest Tools Tcp Port Scanner
  78. Hacking Tools And Software
  79. Hack Tools
  80. Hacking Tools Kit
  81. Hacking Tools Usb
  82. Hacking Tools 2020
  83. Usb Pentest Tools
  84. Hacker Tools Mac
  85. Hack Tools Pc
  86. New Hack Tools
  87. Hack Tools Mac
  88. Hacking Tools Software
  89. Pentest Tools Windows
  90. Hacking Tools 2019
  91. Pentest Tools Alternative
  92. Beginner Hacker Tools
  93. Hackers Toolbox
  94. Computer Hacker
  95. Hacking Tools Pc
  96. Computer Hacker
  97. Pentest Tools Bluekeep
  98. Hacker Techniques Tools And Incident Handling
  99. Hacking Tools For Windows 7
  100. Hacker Tools Online
  101. Hack Tool Apk No Root
  102. What Is Hacking Tools
  103. Hacker Search Tools
  104. Hacker Tools
  105. Computer Hacker
  106. Hacking Tools Name
  107. Hack Tools Github
  108. Install Pentest Tools Ubuntu
  109. Github Hacking Tools
  110. Growth Hacker Tools
  111. Hacker Hardware Tools

No hay comentarios:

Publicar un comentario