WHAT IS FOOTPRITING AND INFORMATION GATHERING IN HACKING?
Footpriting is the technique used for gathering information about computer systems and the entities they belongs too.
To get this information, a hacker might use various tools and technologies.
Basically it is the first step where hacker gather as much information as possible to find the way for cracking the whole system or target or atleast decide what types of attacks will be more suitable for the target.
Footpriting can be both passive and active.
Reviewing a company's website is an example of passive footprinting,
whereas attempting to gain access to sensititve information through social engineering is an example of active information gathering.
During this phase hacking, a hacker can collect the following information>- Domain name
-IP Addresses
-Namespaces
-Employee information
-Phone numbers
-E-mails
Job information
Tip-You can use http://www.whois.com/ website to get detailed information about a domain name information including its owner,its registrar, date of registration, expiry, name servers owner's contact information etc.
Use of Footprinting & Information Gathering in People Searching-
Now a days its very easy to find anyone with his/her full name in social media sites like Facebook, Instragram,Twitter,Linkdedin to gather information about date of birth,birthplace, real photos, education detail, hobbies, relationship status etc.
There are several sites like PIPL,PeekYou, Transport Sites such as mptransport,uptransport etc and Job placement Sites such as Shine.com,Naukari.com , Monster.com etc which are very useful for hacker to collect information about anyone.
Hacker collect the information about you from your Resume which you uploaded on job placement site for seeking a job as well as hacker collect the information from your vehicle number also from transport sites to know about the owner of vehicle, adderess etc then after they make plan how to attack on victim to earn money after know about him/her from collecting information.
INFORMATION GATHERING-It is the process of collecting the information from different places about any individual company,organization, server, ip address or person.
Most of the hacker spend his time in this process.
Information gathering plays a vital role for both investigating and attacking purposes.This is one of the best way to collect victim data and find the vulnerability and loopholes to get unauthorized modifications,deletion and unauthorized access.
Related linksFootpriting is the technique used for gathering information about computer systems and the entities they belongs too.
To get this information, a hacker might use various tools and technologies.
Basically it is the first step where hacker gather as much information as possible to find the way for cracking the whole system or target or atleast decide what types of attacks will be more suitable for the target.
Footpriting can be both passive and active.
Reviewing a company's website is an example of passive footprinting,
whereas attempting to gain access to sensititve information through social engineering is an example of active information gathering.
During this phase hacking, a hacker can collect the following information>- Domain name
-IP Addresses
-Namespaces
-Employee information
-Phone numbers
-E-mails
Job information
Tip-You can use http://www.whois.com/ website to get detailed information about a domain name information including its owner,its registrar, date of registration, expiry, name servers owner's contact information etc.
Use of Footprinting & Information Gathering in People Searching-
Now a days its very easy to find anyone with his/her full name in social media sites like Facebook, Instragram,Twitter,Linkdedin to gather information about date of birth,birthplace, real photos, education detail, hobbies, relationship status etc.
There are several sites like PIPL,PeekYou, Transport Sites such as mptransport,uptransport etc and Job placement Sites such as Shine.com,Naukari.com , Monster.com etc which are very useful for hacker to collect information about anyone.
Hacker collect the information about you from your Resume which you uploaded on job placement site for seeking a job as well as hacker collect the information from your vehicle number also from transport sites to know about the owner of vehicle, adderess etc then after they make plan how to attack on victim to earn money after know about him/her from collecting information.
INFORMATION GATHERING-It is the process of collecting the information from different places about any individual company,organization, server, ip address or person.
Most of the hacker spend his time in this process.
Information gathering plays a vital role for both investigating and attacking purposes.This is one of the best way to collect victim data and find the vulnerability and loopholes to get unauthorized modifications,deletion and unauthorized access.
- Hacker Techniques Tools And Incident Handling
- Hacker Tools Free
- Pentest Tools Free
- Hack Apps
- Hacker Tools Apk Download
- Pentest Tools Find Subdomains
- Hackrf Tools
- Hack Tools Github
- Easy Hack Tools
- Hacking Tools
- Hacker Tools Github
- Hacking Tools Free Download
- Hacking Tools 2020
- Pentest Tools Alternative
- Hacker Tools For Windows
- Growth Hacker Tools
- Hack Tools For Ubuntu
- Pentest Tools Alternative
- Pentest Tools For Android
- Hacking Tools Software
- Pentest Tools Url Fuzzer
- World No 1 Hacker Software
- Hacker
- Hackers Toolbox
- Hacker Tools Free
- Hacking Tools Windows 10
- Hack Tools Github
- Pentest Tools For Mac
- Pentest Tools Subdomain
- Hacker Hardware Tools
- Pentest Tools Bluekeep
- Hacking Tools For Beginners
- Hacking Tools For Pc
- Hacker Tools For Ios
- Usb Pentest Tools
- Hacking Tools Windows 10
- Hacking Tools Software
- Hacking Tools Pc
- Blackhat Hacker Tools
- Hacking Tools
- Pentest Recon Tools
- Hacking Tools For Mac
- Hack Tools
- Hacker Tool Kit
- Hacker Tools List
- Easy Hack Tools
- Hacking Tools For Windows
- Hack Tools Github
- Hacking Tools Free Download
- Nsa Hack Tools
- Hack Tools For Windows
- Hacking Apps
- Hacker Tools Mac
- Pentest Tools Find Subdomains
- Hacker Tools List
- Hacker Security Tools
- How To Install Pentest Tools In Ubuntu
- Pentest Tools Website
- Tools Used For Hacking
- Physical Pentest Tools
- Pentest Tools Open Source
- What Is Hacking Tools
- Hacking Tools Free Download
- Pentest Tools Port Scanner
- Hacker Tools For Pc
- Hacker Tools Software
- Hacking Tools Windows
- Free Pentest Tools For Windows
- Pentest Tools Website Vulnerability
- Hacking Tools And Software
- Hacker Tools Hardware
- Termux Hacking Tools 2019
- Tools 4 Hack
- Hacking Tools For Windows 7
- Pentest Tools Bluekeep
- Hackrf Tools
- Underground Hacker Sites
- Hacking Apps
- Hack Tools Pc
- Pentest Tools For Mac
- Hacking Tools For Beginners
- Pentest Automation Tools
- Nsa Hack Tools Download
- Ethical Hacker Tools
- Tools Used For Hacking
- Pentest Tools Free
- Hack Rom Tools
- Hacking Tools Software
- Blackhat Hacker Tools
- Pentest Automation Tools
- Hacking Tools Download
- Hacker Tools Hardware
- Pentest Tools Windows
- Hacking Tools Usb
- Github Hacking Tools
- Pentest Tools Nmap
- Pentest Tools Nmap
- Pentest Box Tools Download
- Hacks And Tools
- Hacking Tools For Windows 7
- Hack Tools For Ubuntu
- Hack Tools Pc
- Hacker Tools For Mac
- Hacker Tools For Ios
- Pentest Tools Online
- Hacker Tools Hardware
- Hack Apps
- Nsa Hack Tools
- Pentest Tools List
- Hacking Tools Online
- Hacker Tools Apk
- Hacking Tools For Kali Linux
- Hacking Tools For Windows 7
- Hack Tools For Games
- Beginner Hacker Tools
- Hacking Tools For Pc
0 comments:
Post a Comment