WHAT IS FOOTPRITING AND INFORMATION GATHERING IN HACKING?
Footpriting is the technique used for gathering information about computer systems and the entities they belongs too.
To get this information, a hacker might use various tools and technologies.
Basically it is the first step where hacker gather as much information as possible to find the way for cracking the whole system or target or atleast decide what types of attacks will be more suitable for the target.
Footpriting can be both passive and active.
Reviewing a company's website is an example of passive footprinting,
whereas attempting to gain access to sensititve information through social engineering is an example of active information gathering.
During this phase hacking, a hacker can collect the following information>- Domain name
-IP Addresses
-Namespaces
-Employee information
-Phone numbers
-E-mails
Job information
Tip-You can use http://www.whois.com/ website to get detailed information about a domain name information including its owner,its registrar, date of registration, expiry, name servers owner's contact information etc.
Use of Footprinting & Information Gathering in People Searching-
Now a days its very easy to find anyone with his/her full name in social media sites like Facebook, Instragram,Twitter,Linkdedin to gather information about date of birth,birthplace, real photos, education detail, hobbies, relationship status etc.
There are several sites like PIPL,PeekYou, Transport Sites such as mptransport,uptransport etc and Job placement Sites such as Shine.com,Naukari.com , Monster.com etc which are very useful for hacker to collect information about anyone.
Hacker collect the information about you from your Resume which you uploaded on job placement site for seeking a job as well as hacker collect the information from your vehicle number also from transport sites to know about the owner of vehicle, adderess etc then after they make plan how to attack on victim to earn money after know about him/her from collecting information.
INFORMATION GATHERING-It is the process of collecting the information from different places about any individual company,organization, server, ip address or person.
Most of the hacker spend his time in this process.
Information gathering plays a vital role for both investigating and attacking purposes.This is one of the best way to collect victim data and find the vulnerability and loopholes to get unauthorized modifications,deletion and unauthorized access.
Footpriting is the technique used for gathering information about computer systems and the entities they belongs too.
To get this information, a hacker might use various tools and technologies.
Basically it is the first step where hacker gather as much information as possible to find the way for cracking the whole system or target or atleast decide what types of attacks will be more suitable for the target.
Footpriting can be both passive and active.
Reviewing a company's website is an example of passive footprinting,
whereas attempting to gain access to sensititve information through social engineering is an example of active information gathering.
During this phase hacking, a hacker can collect the following information>- Domain name
-IP Addresses
-Namespaces
-Employee information
-Phone numbers
-E-mails
Job information
Tip-You can use http://www.whois.com/ website to get detailed information about a domain name information including its owner,its registrar, date of registration, expiry, name servers owner's contact information etc.
Use of Footprinting & Information Gathering in People Searching-
Now a days its very easy to find anyone with his/her full name in social media sites like Facebook, Instragram,Twitter,Linkdedin to gather information about date of birth,birthplace, real photos, education detail, hobbies, relationship status etc.
There are several sites like PIPL,PeekYou, Transport Sites such as mptransport,uptransport etc and Job placement Sites such as Shine.com,Naukari.com , Monster.com etc which are very useful for hacker to collect information about anyone.
Hacker collect the information about you from your Resume which you uploaded on job placement site for seeking a job as well as hacker collect the information from your vehicle number also from transport sites to know about the owner of vehicle, adderess etc then after they make plan how to attack on victim to earn money after know about him/her from collecting information.
INFORMATION GATHERING-It is the process of collecting the information from different places about any individual company,organization, server, ip address or person.
Most of the hacker spend his time in this process.
Information gathering plays a vital role for both investigating and attacking purposes.This is one of the best way to collect victim data and find the vulnerability and loopholes to get unauthorized modifications,deletion and unauthorized access.
More information
- Hack Tools
- Pentest Tools Framework
- Hacker Search Tools
- Hack Tools For Ubuntu
- Pentest Tools Android
- Hacker Tools Mac
- Install Pentest Tools Ubuntu
- Hack App
- Hack Tools For Mac
- Hack Tools Mac
- Pentest Tools
- Hacking Tools Windows 10
- Game Hacking
- Pentest Tools Open Source
- Hacking Tools For Kali Linux
- Hacking Tools For Windows 7
- Hack Tools Mac
- Hacker Techniques Tools And Incident Handling
- Hacking Tools 2019
- Pentest Tools List
- Game Hacking
- Hacker Tools Github
- Pentest Tools Find Subdomains
- Pentest Tools Github
- Pentest Tools For Mac
- Pentest Tools For Ubuntu
- New Hack Tools
- Hacking Tools Name
- New Hack Tools
- Hacker Tools For Mac
- Hacker Tool Kit
- Hacker Tools Software
- Hack App
- Hacking Tools For Pc
- Hacking Tools Usb
- Pentest Tools Framework
- Hack Tools Download
- Hacker Tool Kit
- Hacker Tools Free
- Hack And Tools
- Github Hacking Tools
- Hacking Tools Windows 10
- Hack Tools Mac
- Hacking Tools For Games
- Hacking Tools 2020
- Hacking Tools Online
- Hack Tool Apk No Root
- Hack Tools 2019
- Pentest Tools Bluekeep
- Hacker Tools Mac
- Beginner Hacker Tools
- Hacker Security Tools
- Nsa Hack Tools
- Hacking Tools For Windows
- Hacker Tools For Windows
- Pentest Tools Open Source
- Nsa Hack Tools
- Bluetooth Hacking Tools Kali
- Hacking Tools Name
- Free Pentest Tools For Windows
- Hacking Apps
- Hacker Tools Windows
- Hacking Tools For Kali Linux
- Pentest Tools For Mac
- What Is Hacking Tools
- Hackers Toolbox
- Hacker Tools Apk Download
- Hacking Tools Github
- Hacking Tools 2020
- Pentest Automation Tools
- Free Pentest Tools For Windows
- Easy Hack Tools
- Hacker Tools For Ios
- How To Install Pentest Tools In Ubuntu
- Hacker Tools List
- Pentest Tools Online
- Pentest Tools Android
- Pentest Tools Nmap
- Hacking Tools Windows 10
- Hacker Tools
- Hacking Tools For Mac
- Pentest Tools Port Scanner
- Beginner Hacker Tools
- Hacker Tools 2019
- Hack Tools For Games
- Hacking Tools Mac
- Hacker Techniques Tools And Incident Handling
- Pentest Tools Bluekeep
- Hacker Tools
- Easy Hack Tools
- Hacking Tools For Windows
- Hacking Tools For Mac
- Pentest Tools Url Fuzzer
- Hacker Tools 2019
- Hacking Tools Windows 10
- Pentest Tools Framework
- Pentest Tools For Windows
- Nsa Hacker Tools
- Hacker Tools Apk
- Pentest Tools Download
- Termux Hacking Tools 2019
- Wifi Hacker Tools For Windows
- Underground Hacker Sites
- Pentest Tools Kali Linux
- Hacking Tools Software
- Hack And Tools
- Hacking Tools For Mac
- Hacking Tools Windows 10
- What Are Hacking Tools
- Hacking Tools Software
- Beginner Hacker Tools
- Hacking Tools Pc
- How To Install Pentest Tools In Ubuntu
- Hacker Tools List
- Hacker Hardware Tools
- Hacker Tools
- Hacking Tools For Windows 7
- Hacking Tools Online
- Hack Tools For Mac
- Hacks And Tools
- Black Hat Hacker Tools
- Pentest Tools Subdomain
- Hacker Tools Free
- Hacking Tools For Windows 7
- Hack Tools
- Hacker Tools 2020
- Pentest Tools Download
- Hack App
- Hacker Tools Hardware
- Pentest Tools Open Source
- Hack App
- Hack Rom Tools
- Game Hacking
- Growth Hacker Tools
- Hacker Tools List
- Hacking Tools Mac
- Hacker Tools Free Download
- Hacking Tools
- Hacking Apps
- Hack Tools
- Hacking Tools For Beginners
- Hack Tools Download
- Hacking Tools For Windows 7
- Hacking Tools Github
- Pentest Tools Github
- Hacker Security Tools
- Hack Tools For Ubuntu
- Pentest Tools Linux
- Computer Hacker
- Hacking Tools For Games
- Hacking Tools For Kali Linux
No comments:
Post a Comment