domingo, 30 de agosto de 2020

FOOTPRITING AND INFORMATION GATHERING USED IN HACKING

WHAT IS FOOTPRITING AND INFORMATION GATHERING IN HACKING?

Footpriting is the technique used for gathering information about computer systems and the entities they belongs too. 
To get this information, a hacker might use various tools and technologies.

Basically it is the first step where hacker gather as much information as possible to find the way for cracking the whole system or target or atleast decide what types of attacks will be more suitable for the target.

Footpriting can be both passive and active.

Reviewing a company's website is an example of passive footprinting, 
whereas attempting to gain access to sensititve information through social engineering is an example of active information gathering.

During this phase hacking, a hacker can collect the following information>- Domain name
-IP Addresses
-Namespaces
-Employee information 
-Phone numbers
-E-mails 
Job information

Tip-You can use http://www.whois.com/ website to get detailed information about a domain name information including its owner,its registrar, date of registration, expiry, name servers owner's contact information etc.

Use of  Footprinting & Information Gathering in People Searching-
Now a days its very easy to find anyone with his/her full name in social media sites like Facebook, Instragram,Twitter,Linkdedin to gather information about date of birth,birthplace, real photos, education detail, hobbies, relationship status etc.

There are several sites like PIPL,PeekYou, Transport Sites such as mptransport,uptransport etc and Job placement Sites such as Shine.com,Naukari.com , Monster.com etc which are very useful for hacker to collect information about anyone.  
Hacker collect the information about you from your Resume which you uploaded on job placement site for seeking a job as well as  hacker collect the information from your vehicle number also from transport sites to know about the owner of vehicle, adderess etc then after they make plan how to attack on victim to earn money after know about him/her from collecting information.




INFORMATION GATHERING-It is the process of collecting the information from different places about any individual company,organization, server, ip address or person.
Most of the hacker spend his time in this process.

Information gathering plays a vital role for both investigating and attacking purposes.This is one of the best way to collect victim data and find the vulnerability and loopholes to get unauthorized modifications,deletion and unauthorized access.



More articles

  1. Hacker Tools Apk
  2. Hack Tool Apk No Root
  3. Easy Hack Tools
  4. Hacking Tools Name
  5. Pentest Tools Subdomain
  6. Best Hacking Tools 2020
  7. Game Hacking
  8. Hacker Tools For Windows
  9. Pentest Tools For Ubuntu
  10. Pentest Tools Apk
  11. Pentest Tools Port Scanner
  12. Hacker Tools Github
  13. Kik Hack Tools
  14. Pentest Tools For Mac
  15. Pentest Tools For Mac
  16. New Hacker Tools
  17. Hack Tools Mac
  18. Pentest Recon Tools
  19. Hacking Tools For Games
  20. Hacking Tools Software
  21. Pentest Tools Website Vulnerability
  22. Pentest Recon Tools
  23. Hacker Hardware Tools
  24. Hack App
  25. New Hacker Tools
  26. Pentest Tools Website Vulnerability
  27. Hacker Hardware Tools
  28. Hacking Tools For Kali Linux
  29. Hack Tools 2019
  30. Hack Tools For Ubuntu
  31. Pentest Tools Windows
  32. Wifi Hacker Tools For Windows
  33. Hacking Tools For Pc
  34. Nsa Hack Tools Download
  35. Hack Apps
  36. Pentest Tools For Mac
  37. Usb Pentest Tools
  38. Pentest Tools Review
  39. Pentest Tools Github
  40. Hacker Tools Github
  41. How To Make Hacking Tools
  42. Hacker Tools For Ios
  43. Hacker Tools Github
  44. Hacker Tools Free
  45. Hack Tools Download
  46. Pentest Box Tools Download
  47. Hackers Toolbox
  48. Hacker Tools Software
  49. World No 1 Hacker Software
  50. Hacker Tools Apk Download
  51. Hacker Tool Kit
  52. Top Pentest Tools
  53. Hacking Tools For Windows Free Download
  54. Growth Hacker Tools
  55. Pentest Tools Free
  56. Pentest Tools Online
  57. Hacking Tools Hardware
  58. Blackhat Hacker Tools
  59. Pentest Tools Github
  60. Bluetooth Hacking Tools Kali
  61. Ethical Hacker Tools
  62. Hackrf Tools
  63. Hacker Search Tools
  64. Bluetooth Hacking Tools Kali
  65. Hack Tools
  66. Hacking Tools Github
  67. Hack App
  68. Nsa Hack Tools Download
  69. Beginner Hacker Tools
  70. Hacking Tools Usb
  71. Pentest Reporting Tools
  72. Pentest Tools List
  73. Hacking Tools Hardware
  74. How To Hack
  75. Pentest Tools
  76. Hacker Tools List
  77. Hacker Tools Apk Download
  78. How To Make Hacking Tools
  79. Hacker Tools Github
  80. Hacking Tools Github
  81. Hacking Tools For Beginners
  82. Pentest Tools Apk
  83. Hacker Tools Linux
  84. Hacking Tools Usb
  85. Install Pentest Tools Ubuntu
  86. Growth Hacker Tools
  87. Physical Pentest Tools
  88. Hack Rom Tools
  89. Hacking Tools Download
  90. Pentest Automation Tools
  91. Hacking Tools 2019
  92. Nsa Hack Tools Download
  93. Physical Pentest Tools
  94. Hacking Tools Hardware
  95. Free Pentest Tools For Windows
  96. What Is Hacking Tools

No hay comentarios: