Humour In Verse

From The warped mind of Emac

Thursday, January 25, 2024

FOOTPRITING AND INFORMATION GATHERING USED IN HACKING

WHAT IS FOOTPRITING AND INFORMATION GATHERING IN HACKING?

Footpriting is the technique used for gathering information about computer systems and the entities they belongs too. 
To get this information, a hacker might use various tools and technologies.

Basically it is the first step where hacker gather as much information as possible to find the way for cracking the whole system or target or atleast decide what types of attacks will be more suitable for the target.

Footpriting can be both passive and active.

Reviewing a company's website is an example of passive footprinting, 
whereas attempting to gain access to sensititve information through social engineering is an example of active information gathering.

During this phase hacking, a hacker can collect the following information>- Domain name
-IP Addresses
-Namespaces
-Employee information 
-Phone numbers
-E-mails 
Job information

Tip-You can use http://www.whois.com/ website to get detailed information about a domain name information including its owner,its registrar, date of registration, expiry, name servers owner's contact information etc.

Use of  Footprinting & Information Gathering in People Searching-
Now a days its very easy to find anyone with his/her full name in social media sites like Facebook, Instragram,Twitter,Linkdedin to gather information about date of birth,birthplace, real photos, education detail, hobbies, relationship status etc.

There are several sites like PIPL,PeekYou, Transport Sites such as mptransport,uptransport etc and Job placement Sites such as Shine.com,Naukari.com , Monster.com etc which are very useful for hacker to collect information about anyone.  
Hacker collect the information about you from your Resume which you uploaded on job placement site for seeking a job as well as  hacker collect the information from your vehicle number also from transport sites to know about the owner of vehicle, adderess etc then after they make plan how to attack on victim to earn money after know about him/her from collecting information.




INFORMATION GATHERING-It is the process of collecting the information from different places about any individual company,organization, server, ip address or person.
Most of the hacker spend his time in this process.

Information gathering plays a vital role for both investigating and attacking purposes.This is one of the best way to collect victim data and find the vulnerability and loopholes to get unauthorized modifications,deletion and unauthorized access.



Continue reading
  1. Hacker Tools Apk Download
  2. Pentest Box Tools Download
  3. Hacking Tools Usb
  4. How To Hack
  5. Hack Rom Tools
  6. Hack Tools For Games
  7. Hacking Tools Mac
  8. Nsa Hack Tools
  9. Hacker Tools List
  10. Hacker Tools Linux
  11. Hacking Tools Mac
  12. Pentest Tools For Windows
  13. Hacker Tools Software
  14. Hacker Tools For Mac
  15. Hack Tools For Mac
  16. Pentest Tools Open Source
  17. Hacker Tool Kit
  18. Hacker Tools Software
  19. Hack Tools Download
  20. Hacking Tools Windows 10
  21. Hack Tools Pc
  22. Blackhat Hacker Tools
  23. Hacking Tools Windows 10
  24. Hack Tools Download
  25. Hacking Tools 2019
  26. Hacker Tools For Mac
  27. Hacker Hardware Tools
  28. Hacker Tools Free
  29. Hacker Techniques Tools And Incident Handling
  30. Hak5 Tools
  31. Pentest Tools Linux
  32. Hacker Tools 2019
  33. Growth Hacker Tools
  34. Pentest Tools Alternative
  35. Hacking Apps
  36. Usb Pentest Tools
  37. Hack Apps
  38. Hack And Tools
  39. Hack Tools Github
  40. Pentest Tools Port Scanner
  41. Pentest Tools For Android
  42. Computer Hacker
  43. Hacking Tools Download
  44. What Is Hacking Tools
  45. New Hacker Tools
  46. Hack Tools 2019
  47. How To Hack
  48. Best Hacking Tools 2019
  49. Hacking Tools For Windows
  50. Hacking Tools 2020
  51. Pentest Tools Url Fuzzer
  52. Hacking Tools For Kali Linux
  53. Hack Tools Mac
  54. Pentest Tools Linux
  55. Hacking Tools Github
  56. Bluetooth Hacking Tools Kali
  57. Pentest Tools Website Vulnerability
  58. World No 1 Hacker Software
  59. Pentest Automation Tools
  60. Tools Used For Hacking
  61. Hacker Hardware Tools
  62. Hacker Tools Windows
  63. Free Pentest Tools For Windows
  64. Nsa Hacker Tools
  65. Hacking Tools Mac
  66. Hack Tools 2019
  67. Pentest Tools Github
  68. Tools 4 Hack
  69. Hack Tools For Games
  70. Black Hat Hacker Tools
  71. Hacking Tools For Windows 7
  72. Hacking Tools For Games
  73. Hacker Tools Linux
  74. Hacking App
  75. Android Hack Tools Github
  76. Pentest Tools Framework
  77. Hacking App
  78. Hacking Tools Windows 10
  79. Pentest Tools For Ubuntu
  80. Android Hack Tools Github
  81. Hack Tools
  82. Github Hacking Tools
  83. Hacker Tools For Mac
  84. Pentest Tools Github
  85. Github Hacking Tools
  86. Hack Tools Github
  87. Hacker Tools Free
  88. Pentest Tools Subdomain
  89. Hacker Tools For Pc
  90. Hack Tool Apk No Root
  91. Hacking Tools And Software
  92. Hack Tools Github
  93. Hacking Apps
  94. Easy Hack Tools
  95. Hacking Tools Pc
  96. Pentest Tools Find Subdomains
  97. Best Hacking Tools 2020
  98. Hack Tool Apk No Root
  99. Tools For Hacker
  100. Bluetooth Hacking Tools Kali
  101. Pentest Tools Review
  102. Hack Tools For Windows
  103. Pentest Tools Open Source
  104. Hacker Tools Windows
  105. Hacker Tools Windows
  106. Pentest Box Tools Download
  107. Hacking Apps
  108. Pentest Tools Android
  109. Hacking Tools Pc
  110. Hack Tools Download
  111. Hack Rom Tools
  112. Hacker Tools Hardware
  113. Pentest Automation Tools
  114. Hack Tools
  115. Hacker Tools Github
  116. Hacks And Tools
  117. Hacking Tools Free Download
  118. Android Hack Tools Github
  119. Hacking Tools For Mac
  120. Hacking Apps
  121. Ethical Hacker Tools
  122. Pentest Tools Windows
  123. Hacker Tools For Pc
  124. Hack Tools Mac
  125. Hacker Techniques Tools And Incident Handling
  126. Hacker Tools For Ios
  127. Hack Tools Pc
  128. Hacker Tools Online

0 Comments:

Post a Comment

<< Home