Tuesday, January 23, 2024

FOOTPRITING AND INFORMATION GATHERING USED IN HACKING

WHAT IS FOOTPRITING AND INFORMATION GATHERING IN HACKING?

Footpriting is the technique used for gathering information about computer systems and the entities they belongs too. 
To get this information, a hacker might use various tools and technologies.

Basically it is the first step where hacker gather as much information as possible to find the way for cracking the whole system or target or atleast decide what types of attacks will be more suitable for the target.

Footpriting can be both passive and active.

Reviewing a company's website is an example of passive footprinting, 
whereas attempting to gain access to sensititve information through social engineering is an example of active information gathering.

During this phase hacking, a hacker can collect the following information>- Domain name
-IP Addresses
-Namespaces
-Employee information 
-Phone numbers
-E-mails 
Job information

Tip-You can use http://www.whois.com/ website to get detailed information about a domain name information including its owner,its registrar, date of registration, expiry, name servers owner's contact information etc.

Use of  Footprinting & Information Gathering in People Searching-
Now a days its very easy to find anyone with his/her full name in social media sites like Facebook, Instragram,Twitter,Linkdedin to gather information about date of birth,birthplace, real photos, education detail, hobbies, relationship status etc.

There are several sites like PIPL,PeekYou, Transport Sites such as mptransport,uptransport etc and Job placement Sites such as Shine.com,Naukari.com , Monster.com etc which are very useful for hacker to collect information about anyone.  
Hacker collect the information about you from your Resume which you uploaded on job placement site for seeking a job as well as  hacker collect the information from your vehicle number also from transport sites to know about the owner of vehicle, adderess etc then after they make plan how to attack on victim to earn money after know about him/her from collecting information.




INFORMATION GATHERING-It is the process of collecting the information from different places about any individual company,organization, server, ip address or person.
Most of the hacker spend his time in this process.

Information gathering plays a vital role for both investigating and attacking purposes.This is one of the best way to collect victim data and find the vulnerability and loopholes to get unauthorized modifications,deletion and unauthorized access.



More articles
  1. Pentest Tools For Ubuntu
  2. Hacking Tools For Kali Linux
  3. Pentest Tools Bluekeep
  4. Hacker Tools For Mac
  5. Pentest Tools For Android
  6. Hack Tools Download
  7. Growth Hacker Tools
  8. Pentest Tools Url Fuzzer
  9. Pentest Tools For Android
  10. Hack Tool Apk No Root
  11. Nsa Hacker Tools
  12. Hacker Tools Free
  13. Pentest Tools Linux
  14. Hacker Tools Mac
  15. Hacking Tools Windows
  16. Beginner Hacker Tools
  17. Pentest Tools Open Source
  18. New Hack Tools
  19. Pentest Tools Linux
  20. Tools 4 Hack
  21. Android Hack Tools Github
  22. Pentest Tools Nmap
  23. Hacking Tools Hardware
  24. Hacker Tools For Windows
  25. Hacker Techniques Tools And Incident Handling
  26. Hacker Tools
  27. Hack Tool Apk No Root
  28. Pentest Tools Nmap
  29. Pentest Tools Windows
  30. Pentest Tools Windows
  31. Pentest Tools
  32. Hacker Tools Software
  33. Best Hacking Tools 2020
  34. Hack Tools Pc
  35. Pentest Tools Port Scanner
  36. Hack Rom Tools
  37. Pentest Tools Online
  38. Hacking Tools For Pc
  39. Pentest Tools Open Source
  40. Pentest Tools Github
  41. Hacking Apps
  42. Hacking Tools Windows 10
  43. Hacker Tools Hardware
  44. Hacking Tools 2019
  45. Hack Tools For Games
  46. Pentest Tools Tcp Port Scanner
  47. Pentest Tools Website Vulnerability
  48. Pentest Tools Android
  49. Pentest Tools Website Vulnerability
  50. Pentest Automation Tools
  51. Pentest Tools Subdomain
  52. Hacking Tools For Pc
  53. Hacking Tools For Games
  54. Best Hacking Tools 2020
  55. Kik Hack Tools
  56. Pentest Tools Subdomain
  57. Nsa Hack Tools
  58. Hacker Techniques Tools And Incident Handling
  59. Underground Hacker Sites
  60. Hacking Apps
  61. Hack Tools Pc
  62. Hack Tools Online
  63. Hackers Toolbox
  64. Hacking Tools Github
  65. Hacking Tools Pc
  66. Hack Tools Online
  67. Pentest Tools Windows
  68. Hacking App
  69. Hacker Tools Github
  70. Pentest Tools Windows
  71. Hacker Tools Github
  72. New Hacker Tools
  73. Hacker Tool Kit
  74. Hacker Tool Kit
  75. Hacking Tools Name
  76. Hacking Tools For Windows Free Download
  77. Hacker Tools Windows
  78. How To Make Hacking Tools
  79. Hack Tools For Windows
  80. Pentest Box Tools Download
  81. Hacking Tools Kit
  82. Pentest Tools Online
  83. Pentest Tools Url Fuzzer
  84. Hacker Tools 2019
  85. What Are Hacking Tools
  86. Pentest Tools Open Source
  87. Hacker Tools Free Download
  88. Hack And Tools
  89. Hacking Tools Kit
  90. Pentest Tools
  91. Hacker Tools Software
  92. Hack Tools For Games
  93. Hacking Tools Name
  94. Hack Tools For Pc
  95. Pentest Tools Apk
  96. Pentest Tools Open Source
  97. Pentest Tools Apk
  98. Hack Tools Download
  99. Pentest Tools Alternative
  100. Hacker Tools Free
  101. Hak5 Tools
  102. Hack And Tools
  103. Underground Hacker Sites
  104. Wifi Hacker Tools For Windows
  105. Hacker Tools Software
  106. Hacking Tools Online
  107. Hacker Hardware Tools
  108. Termux Hacking Tools 2019
  109. Hacker Tools For Windows
  110. Hack Tool Apk No Root
  111. Pentest Tools Framework
  112. Beginner Hacker Tools
  113. Underground Hacker Sites
  114. Nsa Hack Tools Download
  115. Hacking Tools For Beginners
  116. Hacking Tools And Software
  117. Hacker Tools Windows
  118. Hacking Tools
  119. Hacking Tools Pc
  120. Pentest Tools Website
  121. Pentest Tools Kali Linux
  122. Hacking Tools For Beginners
  123. Hack Tools Download
  124. How To Hack
  125. Nsa Hack Tools
  126. Pentest Tools Download
  127. Hacker Tools Online
  128. Best Hacking Tools 2020
  129. Hacker Hardware Tools

No comments:

Post a Comment