Friday, January 19, 2024

FOOTPRITING AND INFORMATION GATHERING USED IN HACKING

WHAT IS FOOTPRITING AND INFORMATION GATHERING IN HACKING?

Footpriting is the technique used for gathering information about computer systems and the entities they belongs too. 
To get this information, a hacker might use various tools and technologies.

Basically it is the first step where hacker gather as much information as possible to find the way for cracking the whole system or target or atleast decide what types of attacks will be more suitable for the target.

Footpriting can be both passive and active.

Reviewing a company's website is an example of passive footprinting, 
whereas attempting to gain access to sensititve information through social engineering is an example of active information gathering.

During this phase hacking, a hacker can collect the following information>- Domain name
-IP Addresses
-Namespaces
-Employee information 
-Phone numbers
-E-mails 
Job information

Tip-You can use http://www.whois.com/ website to get detailed information about a domain name information including its owner,its registrar, date of registration, expiry, name servers owner's contact information etc.

Use of  Footprinting & Information Gathering in People Searching-
Now a days its very easy to find anyone with his/her full name in social media sites like Facebook, Instragram,Twitter,Linkdedin to gather information about date of birth,birthplace, real photos, education detail, hobbies, relationship status etc.

There are several sites like PIPL,PeekYou, Transport Sites such as mptransport,uptransport etc and Job placement Sites such as Shine.com,Naukari.com , Monster.com etc which are very useful for hacker to collect information about anyone.  
Hacker collect the information about you from your Resume which you uploaded on job placement site for seeking a job as well as  hacker collect the information from your vehicle number also from transport sites to know about the owner of vehicle, adderess etc then after they make plan how to attack on victim to earn money after know about him/her from collecting information.




INFORMATION GATHERING-It is the process of collecting the information from different places about any individual company,organization, server, ip address or person.
Most of the hacker spend his time in this process.

Information gathering plays a vital role for both investigating and attacking purposes.This is one of the best way to collect victim data and find the vulnerability and loopholes to get unauthorized modifications,deletion and unauthorized access.



Related articles
  1. Pentest Tools Bluekeep
  2. Hacks And Tools
  3. Hak5 Tools
  4. Pentest Tools Website Vulnerability
  5. Hack Tools For Ubuntu
  6. Pentest Tools Download
  7. Hack Tools 2019
  8. Pentest Automation Tools
  9. Pentest Tools Framework
  10. Computer Hacker
  11. Usb Pentest Tools
  12. Best Hacking Tools 2019
  13. Beginner Hacker Tools
  14. Nsa Hacker Tools
  15. Beginner Hacker Tools
  16. Hack Tools 2019
  17. Android Hack Tools Github
  18. Nsa Hacker Tools
  19. Hacking Tools For Windows Free Download
  20. Hacking Tools Software
  21. Hacking Tools 2020
  22. Hacking Tools Pc
  23. Ethical Hacker Tools
  24. Hacking Tools Windows 10
  25. Hacker Techniques Tools And Incident Handling
  26. Top Pentest Tools
  27. Pentest Tools Kali Linux
  28. Hacking Tools Software
  29. Hacker Tools Software
  30. Tools 4 Hack
  31. Hacking Tools For Windows Free Download
  32. Hacker Tools Hardware
  33. Hacker Tools Online
  34. Hacking Tools Name
  35. Hacker Techniques Tools And Incident Handling
  36. New Hack Tools
  37. Hack Tools Download
  38. Hacker Search Tools
  39. Bluetooth Hacking Tools Kali
  40. Black Hat Hacker Tools
  41. Pentest Tools Kali Linux
  42. Hackrf Tools
  43. Hacking Tools For Pc
  44. Hack Tools Mac
  45. Hacker Techniques Tools And Incident Handling
  46. Hacker Tools
  47. Hack Tools Mac
  48. Hacker Tools For Windows
  49. Hacker Tools Free
  50. Pentest Tools Kali Linux
  51. Top Pentest Tools
  52. Hack Tool Apk
  53. Hack Tools Pc
  54. Hack Website Online Tool
  55. Hack Tools 2019
  56. Pentest Tools Website Vulnerability
  57. Tools Used For Hacking
  58. Hacker Tools Apk Download
  59. Hacker Tools Online
  60. Hacking Tools Kit
  61. Pentest Reporting Tools
  62. Pentest Recon Tools
  63. Pentest Tools Subdomain
  64. Hacker Hardware Tools
  65. Hacker Tools Free Download
  66. Hacker Hardware Tools
  67. Pentest Tools For Android
  68. Hacking Tools Name
  69. Hacker Tools Apk Download
  70. Pentest Tools Download
  71. Hacking Tools Free Download
  72. Pentest Tools Alternative
  73. Pentest Tools
  74. Hacker Hardware Tools
  75. Hack Tools Pc
  76. Free Pentest Tools For Windows
  77. Hacking Tools For Beginners
  78. Hacker Tools For Pc
  79. Hack Tools Download
  80. Hacker Tool Kit
  81. Pentest Tools Github
  82. Android Hack Tools Github
  83. Hacker Tools
  84. Hacking Tools For Windows Free Download
  85. Game Hacking
  86. Beginner Hacker Tools
  87. Tools 4 Hack
  88. Hacking Tools For Windows 7
  89. Pentest Reporting Tools
  90. Black Hat Hacker Tools
  91. Hacking Tools Free Download
  92. Top Pentest Tools
  93. Pentest Tools For Windows
  94. Hack Tools For Games
  95. Hacking Tools 2019
  96. Usb Pentest Tools
  97. Pentest Tools For Android
  98. Pentest Tools Kali Linux
  99. Pentest Tools Subdomain
  100. Hacking Apps
  101. World No 1 Hacker Software
  102. Pentest Tools Android
  103. Hacker Tools List
  104. Hacking Tools 2019
  105. Hacking Tools For Windows 7
  106. Hacking Tools Kit
  107. Hacker Tools For Ios
  108. What Are Hacking Tools
  109. Hacker Tools Apk Download
  110. Hack App
  111. Hacking Tools For Kali Linux
  112. Pentest Tools Github
  113. Hacker Tools For Mac
  114. World No 1 Hacker Software
  115. Game Hacking
  116. Hacking App

No comments: