Saturday, June 3, 2023

FOOTPRITING AND INFORMATION GATHERING USED IN HACKING

WHAT IS FOOTPRITING AND INFORMATION GATHERING IN HACKING?

Footpriting is the technique used for gathering information about computer systems and the entities they belongs too. 
To get this information, a hacker might use various tools and technologies.

Basically it is the first step where hacker gather as much information as possible to find the way for cracking the whole system or target or atleast decide what types of attacks will be more suitable for the target.

Footpriting can be both passive and active.

Reviewing a company's website is an example of passive footprinting, 
whereas attempting to gain access to sensititve information through social engineering is an example of active information gathering.

During this phase hacking, a hacker can collect the following information>- Domain name
-IP Addresses
-Namespaces
-Employee information 
-Phone numbers
-E-mails 
Job information

Tip-You can use http://www.whois.com/ website to get detailed information about a domain name information including its owner,its registrar, date of registration, expiry, name servers owner's contact information etc.

Use of  Footprinting & Information Gathering in People Searching-
Now a days its very easy to find anyone with his/her full name in social media sites like Facebook, Instragram,Twitter,Linkdedin to gather information about date of birth,birthplace, real photos, education detail, hobbies, relationship status etc.

There are several sites like PIPL,PeekYou, Transport Sites such as mptransport,uptransport etc and Job placement Sites such as Shine.com,Naukari.com , Monster.com etc which are very useful for hacker to collect information about anyone.  
Hacker collect the information about you from your Resume which you uploaded on job placement site for seeking a job as well as  hacker collect the information from your vehicle number also from transport sites to know about the owner of vehicle, adderess etc then after they make plan how to attack on victim to earn money after know about him/her from collecting information.




INFORMATION GATHERING-It is the process of collecting the information from different places about any individual company,organization, server, ip address or person.
Most of the hacker spend his time in this process.

Information gathering plays a vital role for both investigating and attacking purposes.This is one of the best way to collect victim data and find the vulnerability and loopholes to get unauthorized modifications,deletion and unauthorized access.



Related posts
  1. Best Hacking Tools 2019
  2. Usb Pentest Tools
  3. Hacking Tools Pc
  4. Hacking Tools Usb
  5. Hacker Search Tools
  6. Hack Tools For Mac
  7. Pentest Tools Nmap
  8. Pentest Tools Bluekeep
  9. Hacking Tools For Beginners
  10. Tools 4 Hack
  11. Hack Tools For Ubuntu
  12. Hacker Tools Apk
  13. Tools Used For Hacking
  14. Pentest Tools Review
  15. Pentest Tools Windows
  16. Hacking Tools 2019
  17. Hacking Tools For Windows 7
  18. Hacking Tools
  19. Top Pentest Tools
  20. Blackhat Hacker Tools
  21. Hacking Tools Usb
  22. Pentest Tools For Android
  23. Tools Used For Hacking
  24. Pentest Tools Review
  25. Pentest Tools Online
  26. Hacker Tools For Mac
  27. Hacking Tools Software
  28. Hacker Techniques Tools And Incident Handling
  29. Pentest Tools For Android
  30. Hack Rom Tools
  31. Nsa Hack Tools Download
  32. Free Pentest Tools For Windows
  33. Hacker Tools Linux
  34. How To Hack
  35. Usb Pentest Tools
  36. Hacker Tools Hardware
  37. Pentest Tools Framework
  38. Pentest Tools For Ubuntu
  39. Hacking Apps
  40. Hacking Tools For Pc
  41. Hacking Tools Software
  42. Hack Tools For Mac
  43. Hacking Apps
  44. Hack Tools Download
  45. Pentest Tools Find Subdomains
  46. Hacker Tools Online
  47. Hacking Tools Download
  48. Usb Pentest Tools
  49. Hacker Techniques Tools And Incident Handling
  50. Pentest Tools Windows
  51. Pentest Automation Tools
  52. What Is Hacking Tools
  53. Ethical Hacker Tools
  54. Hacker Tools For Pc
  55. Pentest Tools List
  56. Hacking Tools For Mac
  57. Hacking Tools Usb
  58. Tools 4 Hack
  59. Pentest Box Tools Download
  60. Hack Tools
  61. What Is Hacking Tools
  62. Pentest Tools Port Scanner
  63. How To Make Hacking Tools
  64. Hacking Tools Download
  65. Hack Tools Online
  66. Hacker
  67. Pentest Tools Linux
  68. Hacker Hardware Tools
  69. Hacker Tools Apk Download
  70. Hacker Tools Free Download
  71. Hacks And Tools
  72. Pentest Tools Port Scanner
  73. Pentest Tools For Ubuntu
  74. What Are Hacking Tools
  75. Hacker Tools Apk
  76. Hack Website Online Tool
  77. Termux Hacking Tools 2019
  78. Hacker Tools 2019
  79. Pentest Tools Free
  80. Easy Hack Tools
  81. Pentest Tools Bluekeep
  82. Hack App
  83. Hacking Tools Download
  84. Hacking Tools And Software
  85. Best Hacking Tools 2020
  86. Hack Tools
  87. Pentest Tools Github
  88. New Hacker Tools
  89. Bluetooth Hacking Tools Kali
  90. Install Pentest Tools Ubuntu
  91. Black Hat Hacker Tools
  92. Top Pentest Tools
  93. Hacking Tools Kit
  94. Hacking Tools Free Download
  95. Pentest Tools Review
  96. Hacker Techniques Tools And Incident Handling
  97. Hacking Tools For Windows 7
  98. Pentest Tools Online
  99. Pentest Tools Alternative
  100. Hacking Tools Kit
  101. Hack Tools Pc
  102. Hacker Tools Free Download
  103. Hacking Tools Name
  104. Hacker Tool Kit
  105. Hacking Tools Online
  106. Hacker Tools Free
  107. Hacker Tools For Pc
  108. Pentest Tools Website Vulnerability
  109. Pentest Automation Tools
  110. Pentest Tools Subdomain
  111. Ethical Hacker Tools
  112. Hacking Tools Usb
  113. Hacker Tools For Mac
  114. How To Hack
  115. Hacker Tool Kit
  116. Hacking Tools For Games
  117. Pentest Tools For Android
  118. Hacking Tools For Pc
  119. Pentest Tools Kali Linux
  120. Hacker Tools
  121. Pentest Tools Url Fuzzer
  122. Hacker Tools Github
  123. Pentest Tools Windows
  124. Usb Pentest Tools
  125. Pentest Tools Bluekeep
  126. World No 1 Hacker Software
  127. Pentest Tools Url Fuzzer
  128. Hacker Techniques Tools And Incident Handling
  129. Hacker Tools Linux
  130. Pentest Tools For Windows
  131. Wifi Hacker Tools For Windows
  132. Ethical Hacker Tools
  133. Hack Tools Download
  134. Hacking Tools For Games
  135. Pentest Tools Android
  136. Hacking Tools Name
  137. Best Hacking Tools 2020
  138. Hak5 Tools
  139. Pentest Tools Online
  140. Hacking Tools For Beginners
  141. Pentest Tools For Android
  142. Pentest Tools Linux
  143. Hacker Techniques Tools And Incident Handling
  144. Hacker Tools Free
  145. Pentest Tools For Ubuntu
  146. Hacker Hardware Tools
  147. Hacker Security Tools
  148. Hacker Tools For Ios
  149. Hacking Tools For Kali Linux
  150. Hacker Tools Software
  151. Hacking Tools
  152. World No 1 Hacker Software
  153. Hacker Tools Apk
  154. New Hack Tools
  155. How To Hack
  156. Hacker Tools For Mac
  157. Pentest Tools Bluekeep
  158. Bluetooth Hacking Tools Kali
  159. Pentest Tools For Mac
  160. Hack And Tools
  161. Pentest Tools Review
  162. Hacker Tools Hardware
  163. Pentest Tools Framework
  164. Pentest Tools Free
  165. Easy Hack Tools
  166. Hacking Tools For Mac
  167. Hacking Tools For Windows Free Download
  168. Pentest Tools Linux

No comments: