jueves, 1 de junio de 2023

FOOTPRITING AND INFORMATION GATHERING USED IN HACKING

WHAT IS FOOTPRITING AND INFORMATION GATHERING IN HACKING?

Footpriting is the technique used for gathering information about computer systems and the entities they belongs too. 
To get this information, a hacker might use various tools and technologies.

Basically it is the first step where hacker gather as much information as possible to find the way for cracking the whole system or target or atleast decide what types of attacks will be more suitable for the target.

Footpriting can be both passive and active.

Reviewing a company's website is an example of passive footprinting, 
whereas attempting to gain access to sensititve information through social engineering is an example of active information gathering.

During this phase hacking, a hacker can collect the following information>- Domain name
-IP Addresses
-Namespaces
-Employee information 
-Phone numbers
-E-mails 
Job information

Tip-You can use http://www.whois.com/ website to get detailed information about a domain name information including its owner,its registrar, date of registration, expiry, name servers owner's contact information etc.

Use of  Footprinting & Information Gathering in People Searching-
Now a days its very easy to find anyone with his/her full name in social media sites like Facebook, Instragram,Twitter,Linkdedin to gather information about date of birth,birthplace, real photos, education detail, hobbies, relationship status etc.

There are several sites like PIPL,PeekYou, Transport Sites such as mptransport,uptransport etc and Job placement Sites such as Shine.com,Naukari.com , Monster.com etc which are very useful for hacker to collect information about anyone.  
Hacker collect the information about you from your Resume which you uploaded on job placement site for seeking a job as well as  hacker collect the information from your vehicle number also from transport sites to know about the owner of vehicle, adderess etc then after they make plan how to attack on victim to earn money after know about him/her from collecting information.




INFORMATION GATHERING-It is the process of collecting the information from different places about any individual company,organization, server, ip address or person.
Most of the hacker spend his time in this process.

Information gathering plays a vital role for both investigating and attacking purposes.This is one of the best way to collect victim data and find the vulnerability and loopholes to get unauthorized modifications,deletion and unauthorized access.



Related articles


  1. Hack Website Online Tool
  2. Hacking Tools
  3. Pentest Tools Apk
  4. Pentest Tools Android
  5. Pentest Tools Framework
  6. Hacker Tools Apk
  7. Hacker Tools Online
  8. Hacker Tools Linux
  9. Hack Tool Apk No Root
  10. Termux Hacking Tools 2019
  11. Hacker Tools Software
  12. Hacker Tools Github
  13. What Are Hacking Tools
  14. Hacker Tools For Mac
  15. Hacking Tools For Pc
  16. Hack Tools Github
  17. Beginner Hacker Tools
  18. Nsa Hacker Tools
  19. Hacker Tool Kit
  20. Hacking Tools Mac
  21. Pentest Tools Url Fuzzer
  22. Tools 4 Hack
  23. Hack Tools
  24. Hacking Tools Usb
  25. Hacker Tools Linux
  26. Hak5 Tools
  27. Hack Tools
  28. Github Hacking Tools
  29. Hack Tool Apk No Root
  30. Hacker
  31. Hacking Tools Github
  32. Hacker Tools
  33. Hacker Tools Apk
  34. Hacking App
  35. Hacking Apps
  36. World No 1 Hacker Software
  37. Hacking Tools Download
  38. Android Hack Tools Github
  39. Hacker Hardware Tools
  40. Hacker Security Tools
  41. Hacker Tools 2019
  42. Hacker Search Tools
  43. Hacking Tools Pc
  44. Github Hacking Tools
  45. Pentest Tools Nmap
  46. Hacking Tools Software
  47. Pentest Tools For Mac
  48. Hacking Tools Pc
  49. Hacking Tools For Mac
  50. Pentest Tools Alternative
  51. Pentest Tools Github
  52. What Are Hacking Tools
  53. Pentest Tools Url Fuzzer
  54. Hacking Tools 2020
  55. Pentest Tools For Mac
  56. What Are Hacking Tools
  57. Hack Tools For Ubuntu
  58. Hacker Techniques Tools And Incident Handling
  59. Pentest Tools List
  60. Hacker Tools 2020
  61. How To Hack
  62. Nsa Hack Tools
  63. Easy Hack Tools
  64. Hacker Tools Online
  65. Hacking Tools Download
  66. Kik Hack Tools
  67. Pentest Recon Tools
  68. Hacker Tools For Ios
  69. Pentest Tools Linux
  70. Hacker Tools Github
  71. Hak5 Tools
  72. Pentest Automation Tools
  73. Pentest Tools Bluekeep
  74. Hak5 Tools
  75. Hack Apps
  76. Beginner Hacker Tools
  77. Android Hack Tools Github
  78. Pentest Tools Nmap
  79. Hacking Tools For Windows 7
  80. Kik Hack Tools
  81. Hak5 Tools
  82. Hacking Tools Free Download
  83. Pentest Tools Review
  84. Hacker Tools 2019
  85. Pentest Box Tools Download
  86. Pentest Tools List
  87. Pentest Tools Find Subdomains
  88. Hacker Security Tools
  89. Hacker Tools For Mac
  90. Hacking Tools For Windows 7
  91. Pentest Tools For Ubuntu
  92. Hacking Tools Mac
  93. Nsa Hacker Tools
  94. Hack Tools Github
  95. Pentest Tools Url Fuzzer
  96. Pentest Tools Url Fuzzer
  97. Hacker Tools Github
  98. Nsa Hack Tools Download

No hay comentarios: