jueves, 25 de mayo de 2023

FOOTPRITING AND INFORMATION GATHERING USED IN HACKING

WHAT IS FOOTPRITING AND INFORMATION GATHERING IN HACKING?

Footpriting is the technique used for gathering information about computer systems and the entities they belongs too. 
To get this information, a hacker might use various tools and technologies.

Basically it is the first step where hacker gather as much information as possible to find the way for cracking the whole system or target or atleast decide what types of attacks will be more suitable for the target.

Footpriting can be both passive and active.

Reviewing a company's website is an example of passive footprinting, 
whereas attempting to gain access to sensititve information through social engineering is an example of active information gathering.

During this phase hacking, a hacker can collect the following information>- Domain name
-IP Addresses
-Namespaces
-Employee information 
-Phone numbers
-E-mails 
Job information

Tip-You can use http://www.whois.com/ website to get detailed information about a domain name information including its owner,its registrar, date of registration, expiry, name servers owner's contact information etc.

Use of  Footprinting & Information Gathering in People Searching-
Now a days its very easy to find anyone with his/her full name in social media sites like Facebook, Instragram,Twitter,Linkdedin to gather information about date of birth,birthplace, real photos, education detail, hobbies, relationship status etc.

There are several sites like PIPL,PeekYou, Transport Sites such as mptransport,uptransport etc and Job placement Sites such as Shine.com,Naukari.com , Monster.com etc which are very useful for hacker to collect information about anyone.  
Hacker collect the information about you from your Resume which you uploaded on job placement site for seeking a job as well as  hacker collect the information from your vehicle number also from transport sites to know about the owner of vehicle, adderess etc then after they make plan how to attack on victim to earn money after know about him/her from collecting information.




INFORMATION GATHERING-It is the process of collecting the information from different places about any individual company,organization, server, ip address or person.
Most of the hacker spend his time in this process.

Information gathering plays a vital role for both investigating and attacking purposes.This is one of the best way to collect victim data and find the vulnerability and loopholes to get unauthorized modifications,deletion and unauthorized access.



More articles


  1. Wifi Hacker Tools For Windows
  2. Hacker Tools
  3. Pentest Tools For Android
  4. Hack And Tools
  5. Hackers Toolbox
  6. Hacking Tools Pc
  7. Pentest Tools Url Fuzzer
  8. Hacker Tools Software
  9. Hack Tool Apk
  10. Pentest Tools Website
  11. Nsa Hack Tools Download
  12. Pentest Tools Kali Linux
  13. Hacking Tools Hardware
  14. Hacking Tools Hardware
  15. Usb Pentest Tools
  16. Pentest Tools
  17. Hacking Tools Name
  18. Hacker Security Tools
  19. Hacker Tools List
  20. Pentest Tools Android
  21. Hacker
  22. Hacking Tools Kit
  23. Hackrf Tools
  24. Pentest Tools
  25. Hacking Tools Github
  26. Pentest Tools For Windows
  27. Install Pentest Tools Ubuntu
  28. Bluetooth Hacking Tools Kali
  29. Pentest Tools For Android
  30. Hacking Tools Hardware
  31. Hack Tools
  32. Pentest Tools For Windows
  33. Black Hat Hacker Tools
  34. Pentest Tools Tcp Port Scanner
  35. Hack Tools
  36. Hack Tools For Games
  37. World No 1 Hacker Software
  38. Android Hack Tools Github
  39. Hacker Tools Free
  40. Pentest Tools Subdomain
  41. Hacker Tools For Mac
  42. Hacker Tools Free Download
  43. Pentest Tools Free
  44. Wifi Hacker Tools For Windows
  45. Pentest Tools Kali Linux
  46. Hack Tools Github
  47. Nsa Hacker Tools
  48. Hacking Tools For Kali Linux
  49. Hacking Tools For Beginners
  50. Hacks And Tools
  51. Hack Tool Apk No Root
  52. Hacker Tools Github
  53. Pentest Tools Alternative
  54. Pentest Tools Website Vulnerability
  55. Hack Tools Mac
  56. Hacker
  57. Hacker Tools For Pc
  58. Hack And Tools
  59. What Are Hacking Tools
  60. What Are Hacking Tools
  61. Hack Tools 2019
  62. Hacking Tools Windows 10
  63. Hack Tools Github
  64. Free Pentest Tools For Windows
  65. Hacking Tools Usb
  66. Github Hacking Tools
  67. Hack Tools Mac
  68. Hack Tools Github
  69. Pentest Tools Alternative
  70. Hacking Tools For Mac
  71. Hacking Apps
  72. Pentest Tools For Ubuntu
  73. Tools For Hacker
  74. Hack Tools For Ubuntu
  75. Pentest Reporting Tools
  76. Hacking Tools 2019
  77. Hacking Tools Github
  78. Hacker Tools For Pc
  79. Hacking Tools Pc
  80. Tools 4 Hack
  81. Pentest Tools Github
  82. Hacker Search Tools
  83. Usb Pentest Tools
  84. Best Pentesting Tools 2018
  85. Hacker Tools Online
  86. Hack Tools Mac
  87. Hacker Tools Free Download
  88. Hack Tools Online
  89. Pentest Tools Framework
  90. How To Install Pentest Tools In Ubuntu
  91. Nsa Hack Tools
  92. Hacker Tools Linux
  93. Pentest Tools Find Subdomains
  94. Pentest Tools Github

No hay comentarios:

Publicar un comentario