Wednesday, August 26, 2020

FOOTPRITING AND INFORMATION GATHERING USED IN HACKING

WHAT IS FOOTPRITING AND INFORMATION GATHERING IN HACKING?

Footpriting is the technique used for gathering information about computer systems and the entities they belongs too. 
To get this information, a hacker might use various tools and technologies.

Basically it is the first step where hacker gather as much information as possible to find the way for cracking the whole system or target or atleast decide what types of attacks will be more suitable for the target.

Footpriting can be both passive and active.

Reviewing a company's website is an example of passive footprinting, 
whereas attempting to gain access to sensititve information through social engineering is an example of active information gathering.

During this phase hacking, a hacker can collect the following information>- Domain name
-IP Addresses
-Namespaces
-Employee information 
-Phone numbers
-E-mails 
Job information

Tip-You can use http://www.whois.com/ website to get detailed information about a domain name information including its owner,its registrar, date of registration, expiry, name servers owner's contact information etc.

Use of  Footprinting & Information Gathering in People Searching-
Now a days its very easy to find anyone with his/her full name in social media sites like Facebook, Instragram,Twitter,Linkdedin to gather information about date of birth,birthplace, real photos, education detail, hobbies, relationship status etc.

There are several sites like PIPL,PeekYou, Transport Sites such as mptransport,uptransport etc and Job placement Sites such as Shine.com,Naukari.com , Monster.com etc which are very useful for hacker to collect information about anyone.  
Hacker collect the information about you from your Resume which you uploaded on job placement site for seeking a job as well as  hacker collect the information from your vehicle number also from transport sites to know about the owner of vehicle, adderess etc then after they make plan how to attack on victim to earn money after know about him/her from collecting information.




INFORMATION GATHERING-It is the process of collecting the information from different places about any individual company,organization, server, ip address or person.
Most of the hacker spend his time in this process.

Information gathering plays a vital role for both investigating and attacking purposes.This is one of the best way to collect victim data and find the vulnerability and loopholes to get unauthorized modifications,deletion and unauthorized access.



Related word


  1. Tools 4 Hack
  2. Hacker Tools Free Download
  3. Hacking Tools For Windows 7
  4. Hacking Tools Download
  5. Pentest Tools For Android
  6. Hacker Tools 2020
  7. Growth Hacker Tools
  8. Hacker Tools Github
  9. Tools For Hacker
  10. World No 1 Hacker Software
  11. Tools Used For Hacking
  12. Hacking Tools For Mac
  13. Pentest Tools Open Source
  14. Hacking Apps
  15. Hack Tools For Windows
  16. Pentest Box Tools Download
  17. Tools Used For Hacking
  18. Hacking Tools Software
  19. Hacker Tools For Windows
  20. Hack Tools Mac
  21. Hacking Tools Free Download
  22. Pentest Tools Url Fuzzer
  23. Hacker Tool Kit
  24. Hacker Tools 2019
  25. New Hacker Tools
  26. Pentest Tools List
  27. Hacking Tools For Pc
  28. Growth Hacker Tools
  29. Hacker Tools Apk
  30. Pentest Tools Online
  31. Pentest Recon Tools
  32. Pentest Tools Windows
  33. Hack Rom Tools
  34. Hack Tool Apk No Root
  35. Pentest Automation Tools
  36. Hacker Techniques Tools And Incident Handling
  37. New Hack Tools
  38. Pentest Tools Kali Linux
  39. Github Hacking Tools
  40. Computer Hacker
  41. Hacking Tools
  42. Hacker Tools Linux
  43. Hacker Tools Windows
  44. Pentest Tools Open Source
  45. Hacker Tools For Windows
  46. Hacker Tools Online
  47. Growth Hacker Tools
  48. Hak5 Tools
  49. Hacking Tools Pc
  50. Hacking Tools For Windows 7
  51. Termux Hacking Tools 2019
  52. Hacking Tools Name
  53. Pentest Automation Tools
  54. Hacker Tools Hardware
  55. Tools 4 Hack
  56. Hack Tools 2019
  57. Hacker Tools Linux
  58. Hack Tools Mac
  59. Pentest Tools Windows
  60. Pentest Tools List
  61. Pentest Tools Subdomain
  62. Android Hack Tools Github
  63. Hacker Tools For Pc
  64. Hack Tools Pc
  65. Pentest Tools Android
  66. Pentest Tools Port Scanner
  67. Hacker Tools List
  68. Hacking Tools Software
  69. Pentest Tools Open Source
  70. Pentest Tools Port Scanner
  71. Tools 4 Hack
  72. Hack Tools For Windows
  73. Pentest Tools For Android
  74. Tools Used For Hacking
  75. Hack Tools For Games
  76. Nsa Hack Tools
  77. Best Pentesting Tools 2018
  78. Nsa Hacker Tools
  79. Hacker Tools List
  80. Pentest Recon Tools
  81. Tools 4 Hack
  82. Hack Rom Tools
  83. Pentest Tools Free
  84. Hacking Tools Name
  85. Hacking Tools For Kali Linux
  86. Hacker Tools For Pc
  87. Nsa Hack Tools
  88. Hacking Tools Download
  89. Hack Apps
  90. Best Hacking Tools 2020
  91. Underground Hacker Sites
  92. How To Make Hacking Tools
  93. Hack Apps
  94. What Are Hacking Tools
  95. Pentest Tools Bluekeep
  96. Hacking Tools Mac
  97. Hacker Tools For Pc
  98. Ethical Hacker Tools
  99. Pentest Tools Find Subdomains
  100. New Hack Tools
  101. Hacking Tools For Mac
  102. Hacker Tools Linux
  103. Pentest Tools Bluekeep
  104. Underground Hacker Sites
  105. Pentest Tools Android
  106. Pentest Tools Website Vulnerability
  107. Pentest Tools For Mac
  108. Pentest Tools For Windows
  109. Hacker Tools For Mac
  110. Hack Tool Apk No Root
  111. Pentest Tools Linux
  112. New Hack Tools
  113. Hacker Tools List
  114. Hacking Tools
  115. New Hacker Tools
  116. Pentest Tools Windows
  117. Hacker Tools Free
  118. Hacker Techniques Tools And Incident Handling
  119. Hack Tools For Windows
  120. Kik Hack Tools

No comments:

Post a Comment