Sunday, January 28, 2024

FOOTPRITING AND INFORMATION GATHERING USED IN HACKING

WHAT IS FOOTPRITING AND INFORMATION GATHERING IN HACKING?

Footpriting is the technique used for gathering information about computer systems and the entities they belongs too. 
To get this information, a hacker might use various tools and technologies.

Basically it is the first step where hacker gather as much information as possible to find the way for cracking the whole system or target or atleast decide what types of attacks will be more suitable for the target.

Footpriting can be both passive and active.

Reviewing a company's website is an example of passive footprinting, 
whereas attempting to gain access to sensititve information through social engineering is an example of active information gathering.

During this phase hacking, a hacker can collect the following information>- Domain name
-IP Addresses
-Namespaces
-Employee information 
-Phone numbers
-E-mails 
Job information

Tip-You can use http://www.whois.com/ website to get detailed information about a domain name information including its owner,its registrar, date of registration, expiry, name servers owner's contact information etc.

Use of  Footprinting & Information Gathering in People Searching-
Now a days its very easy to find anyone with his/her full name in social media sites like Facebook, Instragram,Twitter,Linkdedin to gather information about date of birth,birthplace, real photos, education detail, hobbies, relationship status etc.

There are several sites like PIPL,PeekYou, Transport Sites such as mptransport,uptransport etc and Job placement Sites such as Shine.com,Naukari.com , Monster.com etc which are very useful for hacker to collect information about anyone.  
Hacker collect the information about you from your Resume which you uploaded on job placement site for seeking a job as well as  hacker collect the information from your vehicle number also from transport sites to know about the owner of vehicle, adderess etc then after they make plan how to attack on victim to earn money after know about him/her from collecting information.




INFORMATION GATHERING-It is the process of collecting the information from different places about any individual company,organization, server, ip address or person.
Most of the hacker spend his time in this process.

Information gathering plays a vital role for both investigating and attacking purposes.This is one of the best way to collect victim data and find the vulnerability and loopholes to get unauthorized modifications,deletion and unauthorized access.



Related posts
  1. Hacker Tools Free Download
  2. Hack Tools For Pc
  3. Pentest Tools For Mac
  4. Hack Tools Github
  5. Pentest Tools Android
  6. How To Make Hacking Tools
  7. Usb Pentest Tools
  8. Growth Hacker Tools
  9. Best Hacking Tools 2020
  10. Hacking Tools 2019
  11. Best Hacking Tools 2020
  12. Pentest Reporting Tools
  13. Growth Hacker Tools
  14. Pentest Tools Github
  15. Hacking Tools Kit
  16. Pentest Tools Website Vulnerability
  17. Pentest Tools Android
  18. Usb Pentest Tools
  19. Hacker Tools Mac
  20. Pentest Tools Review
  21. Pentest Tools Bluekeep
  22. Hacker Tools List
  23. Pentest Tools For Windows
  24. Pentest Tools For Ubuntu
  25. Beginner Hacker Tools
  26. Pentest Reporting Tools
  27. Hacker Tools For Ios
  28. Hack Tool Apk No Root
  29. Hacking Tools Kit
  30. Tools For Hacker
  31. Pentest Tools Open Source
  32. Hacker Tools Mac
  33. Hacker Tools Free Download
  34. Pentest Tools Online
  35. Hacking Tools For Mac
  36. Pentest Tools Url Fuzzer
  37. New Hack Tools
  38. Hack Rom Tools
  39. Hacking App
  40. Install Pentest Tools Ubuntu
  41. Hacking Tools Software
  42. Free Pentest Tools For Windows
  43. Kik Hack Tools
  44. Hacking Tools 2020
  45. Tools For Hacker
  46. Hacking Tools For Pc
  47. Hacker Tools Free
  48. Nsa Hacker Tools
  49. Hackers Toolbox
  50. Hacking Tools For Windows 7
  51. Growth Hacker Tools
  52. Pentest Tools Framework
  53. Hack Apps
  54. Hack Tools For Windows
  55. Hack And Tools
  56. Physical Pentest Tools
  57. Hacking Tools For Windows Free Download
  58. Pentest Tools Download
  59. Pentest Tools Website Vulnerability
  60. Hacker Tools For Windows
  61. Hacker Tools For Mac
  62. Hack And Tools
  63. Pentest Tools Framework
  64. Hack Tools Online
  65. Hacking App
  66. Hacking Tools And Software
  67. Hack Tools For Pc
  68. Computer Hacker
  69. Hacking Tools For Windows 7
  70. Pentest Tools Github
  71. Pentest Tools Find Subdomains
  72. Hacking Tools Kit
  73. Hack Tools 2019
  74. Hacking Tools Usb
  75. Hacker Techniques Tools And Incident Handling
  76. Hacking Tools For Games
  77. Hack Tool Apk
  78. Pentest Tools Free
  79. Tools For Hacker
  80. Hacker Tools 2019
  81. Hacking App
  82. Hacker Tools For Mac
  83. Pentest Tools Download
  84. Hacker Tools 2020
  85. Hack Tools 2019
  86. Hackrf Tools
  87. Install Pentest Tools Ubuntu
  88. Pentest Tools Bluekeep
  89. What Are Hacking Tools
  90. Usb Pentest Tools
  91. Hacking Tools
  92. Hacker Tools Free
  93. Pentest Tools For Android
  94. Android Hack Tools Github
  95. Hacker Tools Github
  96. Pentest Tools List
  97. Pentest Tools Tcp Port Scanner
  98. Hacker Tools Free Download
  99. Hacker Tools For Windows
  100. Hack App
  101. Hack Tools For Pc
  102. New Hack Tools
  103. Hacker Tools 2020
  104. Ethical Hacker Tools
  105. Hacking Tools Windows
  106. Hack Tools 2019
  107. Hacking Tools For Windows
  108. Hacker Search Tools
  109. Hacker Security Tools
  110. Black Hat Hacker Tools
  111. Hacking Tools For Windows
  112. Pentest Tools Open Source
  113. Hacking Tools Github
  114. Hacker Search Tools
  115. Pentest Tools Url Fuzzer
  116. Hacker Tools Apk
  117. Pentest Tools Nmap
  118. Pentest Tools Framework
  119. Pentest Tools Android
  120. Hacking Tools Usb
  121. Pentest Tools For Mac
  122. Hack Tool Apk No Root
  123. Hacking Tools Software
  124. Pentest Tools For Windows
  125. Pentest Tools Kali Linux
  126. Android Hack Tools Github
  127. Beginner Hacker Tools
  128. Hacker Tools Linux
  129. Hacking Tools Hardware
  130. Hacker Techniques Tools And Incident Handling
  131. Hacker Tools Online
  132. Termux Hacking Tools 2019
  133. Pentest Tools Website
  134. Tools 4 Hack
  135. Pentest Tools Find Subdomains
  136. What Is Hacking Tools
  137. Ethical Hacker Tools
  138. Hacking Tools Windows 10
  139. Hacking Tools For Pc
  140. New Hacker Tools
  141. Hack Tool Apk
  142. Hacker Tools Apk Download
  143. Hacking Tools Usb
  144. Hacking Tools For Kali Linux
  145. Pentest Tools Url Fuzzer
  146. Hack Tools Mac
  147. Hack Rom Tools
  148. Hacker
  149. Hacking Tools 2019
  150. Pentest Tools Framework
  151. Pentest Tools Subdomain
  152. Pentest Tools Find Subdomains
  153. Hacking Tools Mac
  154. Usb Pentest Tools
  155. Black Hat Hacker Tools
  156. Hack Tools For Games
  157. Hack Apps
  158. Best Pentesting Tools 2018
  159. Hacking Tools Hardware
  160. Pentest Tools Kali Linux
  161. Hacker Tools Software
  162. What Are Hacking Tools
  163. Hacker Tools For Mac

No comments:

Post a Comment