Mittwoch, Mai 31, 2023

FOOTPRITING AND INFORMATION GATHERING USED IN HACKING

WHAT IS FOOTPRITING AND INFORMATION GATHERING IN HACKING?

Footpriting is the technique used for gathering information about computer systems and the entities they belongs too. 
To get this information, a hacker might use various tools and technologies.

Basically it is the first step where hacker gather as much information as possible to find the way for cracking the whole system or target or atleast decide what types of attacks will be more suitable for the target.

Footpriting can be both passive and active.

Reviewing a company's website is an example of passive footprinting, 
whereas attempting to gain access to sensititve information through social engineering is an example of active information gathering.

During this phase hacking, a hacker can collect the following information>- Domain name
-IP Addresses
-Namespaces
-Employee information 
-Phone numbers
-E-mails 
Job information

Tip-You can use http://www.whois.com/ website to get detailed information about a domain name information including its owner,its registrar, date of registration, expiry, name servers owner's contact information etc.

Use of  Footprinting & Information Gathering in People Searching-
Now a days its very easy to find anyone with his/her full name in social media sites like Facebook, Instragram,Twitter,Linkdedin to gather information about date of birth,birthplace, real photos, education detail, hobbies, relationship status etc.

There are several sites like PIPL,PeekYou, Transport Sites such as mptransport,uptransport etc and Job placement Sites such as Shine.com,Naukari.com , Monster.com etc which are very useful for hacker to collect information about anyone.  
Hacker collect the information about you from your Resume which you uploaded on job placement site for seeking a job as well as  hacker collect the information from your vehicle number also from transport sites to know about the owner of vehicle, adderess etc then after they make plan how to attack on victim to earn money after know about him/her from collecting information.




INFORMATION GATHERING-It is the process of collecting the information from different places about any individual company,organization, server, ip address or person.
Most of the hacker spend his time in this process.

Information gathering plays a vital role for both investigating and attacking purposes.This is one of the best way to collect victim data and find the vulnerability and loopholes to get unauthorized modifications,deletion and unauthorized access.



Read more

  1. Hacker Tools Software
  2. Pentest Tools Alternative
  3. Pentest Tools Tcp Port Scanner
  4. Beginner Hacker Tools
  5. Pentest Tools Tcp Port Scanner
  6. Pentest Tools For Ubuntu
  7. How To Install Pentest Tools In Ubuntu
  8. Computer Hacker
  9. Hacker Tools Linux
  10. Pentest Tools Port Scanner
  11. Hacker Tools List
  12. Hacker Tools Free Download
  13. Pentest Tools Open Source
  14. What Is Hacking Tools
  15. Hack Tools Online
  16. Hacker Tools For Ios
  17. Termux Hacking Tools 2019
  18. Hacking Tools Mac
  19. World No 1 Hacker Software
  20. Hack Tools For Ubuntu
  21. Pentest Box Tools Download
  22. Easy Hack Tools
  23. Underground Hacker Sites
  24. Hacker
  25. Ethical Hacker Tools
  26. Blackhat Hacker Tools
  27. Hacking Tools Windows
  28. Hacker Tools 2019
  29. Easy Hack Tools
  30. Growth Hacker Tools
  31. Hacker Tool Kit
  32. Hack Tools Download
  33. Hacker Tools List
  34. Pentest Tools Github
  35. World No 1 Hacker Software
  36. Hacking Tools Windows 10
  37. Best Hacking Tools 2020
  38. New Hack Tools
  39. Pentest Tools Url Fuzzer
  40. Hak5 Tools
  41. Hack Tools
  42. Hacking Tools Online
  43. Hacking Tools Download
  44. Hacker Search Tools
  45. Hacking Tools Mac
  46. Hacking Tools Online
  47. Bluetooth Hacking Tools Kali
  48. Hacking Tools Usb
  49. Hacker Tools Free Download
  50. Pentest Tools Apk
  51. Pentest Tools For Ubuntu
  52. Hacking App
  53. Top Pentest Tools
  54. Hack Tools Online
  55. Pentest Tools Tcp Port Scanner
  56. Hacking Tools Online
  57. Pentest Tools Online
  58. Hacking Tools Hardware
  59. Top Pentest Tools
  60. Hacking Tools Usb
  61. Hacker Tools For Mac
  62. Hacker Tools Linux
  63. Hack And Tools
  64. Blackhat Hacker Tools
  65. Hacking Tools For Kali Linux
  66. Hacking Tools For Pc
  67. Hack Tools For Games
  68. Pentest Tools Kali Linux
  69. Hacking Tools For Windows 7
  70. Nsa Hack Tools Download
  71. Hacking Tools For Windows Free Download
  72. Hacking Tools For Windows
  73. Hacking Tools For Games
  74. Pentest Tools Alternative
  75. Pentest Tools Url Fuzzer
  76. Usb Pentest Tools
  77. Pentest Tools Nmap
  78. Pentest Tools For Ubuntu
  79. New Hacker Tools
  80. Hack Rom Tools
  81. Pentest Reporting Tools
  82. Hack Tools Download
  83. Pentest Tools Alternative
  84. Nsa Hacker Tools
  85. Hacking Tools Software
  86. Pentest Tools Alternative
  87. Hacker Tools For Ios
  88. Easy Hack Tools
  89. How To Make Hacking Tools
  90. Hacker Tools List
  91. Growth Hacker Tools
  92. Tools 4 Hack
  93. Pentest Tools Tcp Port Scanner
  94. Hack Tools Online
  95. Hacker Tools
  96. Hacker Tools Apk
  97. Pentest Tools For Mac
  98. Computer Hacker
  99. Hacking Tools For Kali Linux
  100. Hack Tools For Games
  101. Black Hat Hacker Tools
  102. What Are Hacking Tools
  103. Bluetooth Hacking Tools Kali
  104. Hack Tools Download
  105. Hacking Tools Download
  106. Hack Tools Pc
  107. Hack Website Online Tool
  108. Pentest Tools Apk